首页 | 本学科首页   官方微博 | 高级检索  
     

移动边缘计算安全研究
引用本文:庄小君,杨波,王旭,彭晋.移动边缘计算安全研究[J].电信工程技术与标准化,2018(12).
作者姓名:庄小君  杨波  王旭  彭晋
作者单位:中国移动通信有限公司研究院,中国移动通信有限公司研究院,中国移动通信有限公司研究院,中国移动通信有限公司研究院
摘    要:移动边缘计算具有靠近用户、业务本地处理、灵活路由等特点,成为满足5G低时延业务需求的关键技术之一。由于移动边缘计算靠近用户、处于相对不安全的环境、核心网控制能力减弱等,存在非授权访问、敏感数据泄露、(D)DoS攻击等安全风险。本文在介绍边缘计算概念、应用场景的基础上,分析移动边缘计算的安全威胁、安全防护框架、安全防护方案,并展望后续研究方向。

关 键 词:移动边缘计算安全  移动边缘计算  安全防护框架
收稿时间:2018/11/12 0:00:00
修稿时间:2018/11/12 0:00:00

Approach on Mobile Edge Computing Security
zhuangxiaojun,yangbo,wangxu and pengjin.Approach on Mobile Edge Computing Security[J].Telecom Engineering Technics and Standardization,2018(12).
Authors:zhuangxiaojun  yangbo  wangxu and pengjin
Affiliation:China mobile research institute,China mobile research institute,China mobile research institute,China mobile research institute
Abstract:Edge computing is considered to be one of the key technologies in providing 5G low latency services. Benefitted from the computing and storage close to the end users, mobile edge computing shall be able to offer runtime environment and resource to latency-sensitive applications, and shall also provide local service processing and flexible routing. Meanwhile, mobile edge computing also introduced risks, such as unsafe environment, weak core control, mobile edge computing suffer from unauthorized access and sensitive data leakage, (D)DoS attacks. This paper introduces the concept and application scenario of edge computing, analyzes security threats, suggests a security protection framework and security protection solutions for mobile edge computing.
Keywords:security for mobile edge computing  mobile edge computing  security protection framework
点击此处可从《电信工程技术与标准化》浏览原始摘要信息
点击此处可从《电信工程技术与标准化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号