Loading…
Terminal Security Configuration Optimization under Edge Computing
It is an important task of system security management to configure terminal security policy reasonably in edge computing (EC) to implement necessary security protection for terminals and EC system. Therefore, this paper analyses the security goals and requirements of terminal access for multi-servic...
Saved in:
Published in: | Journal of physics. Conference series 2020-11, Vol.1673 (1), p.12072 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | It is an important task of system security management to configure terminal security policy reasonably in edge computing (EC) to implement necessary security protection for terminals and EC system. Therefore, this paper analyses the security goals and requirements of terminal access for multi-service EC systems under the power grid, conducts terminal security risk assessment based on the AHP algorithm, and proposes an edge computing platform terminal security configuration optimization strategy, creatively using the OS-ELM algorithm. A framework for cloud training and edge-side online learning to meet the real-time and lightweight communication needs of edge platforms. |
---|---|
ISSN: | 1742-6588 1742-6596 |
DOI: | 10.1088/1742-6596/1673/1/012072 |