Loading…

Terminal Security Configuration Optimization under Edge Computing

It is an important task of system security management to configure terminal security policy reasonably in edge computing (EC) to implement necessary security protection for terminals and EC system. Therefore, this paper analyses the security goals and requirements of terminal access for multi-servic...

Full description

Saved in:
Bibliographic Details
Published in:Journal of physics. Conference series 2020-11, Vol.1673 (1), p.12072
Main Authors: Wang, Qianru, Xu, Aidong, Zhang, Yunan, Cao, Minggui, Song, Jianfang, Jiang, Yixin, Wen, Hong
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:It is an important task of system security management to configure terminal security policy reasonably in edge computing (EC) to implement necessary security protection for terminals and EC system. Therefore, this paper analyses the security goals and requirements of terminal access for multi-service EC systems under the power grid, conducts terminal security risk assessment based on the AHP algorithm, and proposes an edge computing platform terminal security configuration optimization strategy, creatively using the OS-ELM algorithm. A framework for cloud training and edge-side online learning to meet the real-time and lightweight communication needs of edge platforms.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1673/1/012072