首页 | 本学科首页   官方微博 | 高级检索  
     

边缘计算安全防护体系研究
引用本文:代兴宇,廖飞,陈捷.边缘计算安全防护体系研究[J].通信技术,2020(1):201-209.
作者姓名:代兴宇  廖飞  陈捷
作者单位:中国电子科技集团公司第三十研究所
摘    要:首先,介绍各权威机构对边缘计算概念的定义,梳理边缘计算主要的内涵特征;其次,根据现今云计算产业和信息技术的发展趋势,结合边缘计算在各行业的典型应用场景,分析总结边缘计算在实际应用中的安全威胁和风险因素;再次,调查研究边缘计算各团体及标准化组织应对边缘安全威胁的方法和保障体系,提炼边缘计算安全防护体系结构及机制原理;最后,通过引入融合区块链和人工智能技术,在边缘计算安全防护体系的基础上强化边缘防护的应变能力和可信能力,进而实现边缘计算在支撑我国军事应用时的端到端的安全保障。

关 键 词:边缘计算  安全防护  防护机制  云计算

Research on Edge Computing Security Protection System
DAI Xing-yu,LIAO Fei,CHEN Jie.Research on Edge Computing Security Protection System[J].Communications Technology,2020(1):201-209.
Authors:DAI Xing-yu  LIAO Fei  CHEN Jie
Affiliation:(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
Abstract:Firstly,the definitions of the concept of edge computing by various authoritative institutions are introduced,and the main connotative characteristics of edge computing are sorted out.Secondly,according to the current development trend of cloud computing industry and information technology,combined with the typical application scenarios of edge computing in various industries,the security threats and risk factors of edge computing in practical applications are analyzed and summarized.Thirdly,the methods and guarantee systems for various edge computing groups and standardization organizations to deal with edge security threats are investigated,and the edge computing security protection architecture and mechanism principles are refined.Finally,by introducing the integration of blockchain and artificial intelligence technology,based on the edge computing security protection system,the edge protection’s resilience and credibility can be strengthened,so as to achieve the end-to-end security protection of edge computing in supporting national military applications.
Keywords:edge computing  security protection  protection mechanism  cloud computing
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号