Quantitative selection of secure access policies for edge computing side terminals
Download as PDF
DOI: 10.25236/ICICTA.2019.013
Author(s)
Aidong Xu, Qianru Wang, Yixin Jiang, Runfa Liao, Yunan Zhang, Yi Chen, Hong Wen, Jinran Du
Corresponding Author
Aidong Xu
Abstract
As a new computing model in the era of Internet of things, edge computing has the characteristics of distributed, “data first entry”, relatively limited computing and storage resources, which make it not only face the widespread network attacks in information systems, but also inevitably introduce some new security threats, which need to implement end-to-end protection. Therefore, this paper mainly studies the terminal access security in the edge computing system, and puts forward the terminal security access strategy selection scheme based on BP neural network, which can comprehensively evaluate the security risks and threats faced by the terminal and data, select the appropriate algorithm according to the actual needs of the system, and select the security access strategy of the terminal on the edge computing side through quantitative objective standards, so as to realize the edge computing side Maximum optimization of safety performance of edge computing system.
Keywords
Edge computing security; terminal access; quantitative assessment; strategy selection