Ke SHANG, Weizhen HE, Shuai ZHANG, “Review on Security Defense Technology Research in Edge Computing Environment,” Chinese Journal of Electronics,  vol. 33, no. 1, pp. 1–18, 2024. DOI: 10.23919/cje.2022.00.170
Citation: Ke SHANG, Weizhen HE, Shuai ZHANG, “Review on Security Defense Technology Research in Edge Computing Environment,” Chinese Journal of Electronics,  vol. 33, no. 1, pp. 1–18, 2024. DOI: 10.23919/cje.2022.00.170

Review on Security Defense Technology Research in Edge Computing Environment

  • Edge computing, which achieves quick data processing by sinking data computing and storage to the network edge, has grown rapidly along with the Internet of things. The new network architecture of edge computing brings new security challenges. Based on this, this paper investigates the edge computing security literature published in recent years and summarizes and analyzes research work on edge computing security from different attack surfaces. We start with the definition and architecture of edge computing. From the attack surface between device and edge server, as well as on edge servers, the research describes the security threats and defense methods of edge computing. In addition, the cause of the attack and the pros and cons of defense methods is introduced. The challenges and future research directions of edge computing are given.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return