A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing

被引:4
|
作者
Guo, Ziyu [1 ,2 ]
Lu, Yueming [2 ,3 ]
Tian, Huiping [1 ]
Zuo, Jinxin [2 ,3 ]
Lu, Hui [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[2] Minist Educ, Key Lab Trustworthy Distributed Comp & Serv BUPT, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[4] Guangzhou Univ, Guangzhou 510006, Peoples R China
基金
国家重点研发计划;
关键词
Multi-source heterogeneous systems; Security evaluation; IoT; Edge computing; Grey clustering model; Combination weighting method;
D O I
10.1007/s10586-021-03410-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration and rapid development of new technologies such as edge computing and the Internet of Things (IoT) have brought new security challenges. Relying on mainstream security evaluation standards and security architecture, a security evaluation model for multi-source heterogeneous systems based on IoT and edge computing is proposed. An attribute-oriented security strategy decomposition system is established, and an indicator tree suitable for multi-source heterogeneous systems is constructed through mapping relationships. A comprehensive weighting method based on the optimal function theory is proposed. The weights are determined by the method based on indicator correlation and the method based on the amount of indicator information. According to the optimal function theory, the indicator weights obtained by the two methods are combined and optimized to obtain the optimal combination weight of the indicators. A comprehensive indicator measurement method based on the second-order grey cluster model is proposed, to deal with this situation of lack of persuasiveness in security ranking caused by the similar degree of membership in grey cluster evaluation. With this method, grey clustering of the initial score set can be used to obtain security evaluation results, and to rank the security evaluation results. According to the effectiveness evaluation indicator based on the discrimination coefficient and end-to-end consistency, the validity of the evaluation results is analyzed. Based on experiments, the model's good performance in security evaluation and security ranking is verified.
引用
收藏
页码:303 / 317
页数:15
相关论文
共 50 条
  • [1] A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing
    Ziyu Guo
    Yueming Lu
    Huiping Tian
    Jinxin Zuo
    Hui Lu
    [J]. Cluster Computing, 2023, 26 : 303 - 317
  • [2] Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing
    Li, Jing
    Liang, Weifa
    Xu, Zichuan
    Jia, Xiaohua
    Zhou, Wanlei
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (02)
  • [3] Federated Generative Model on Multi-Source Heterogeneous Data in IoT
    Xiong, Zuobin
    Li, Wei
    Cai, Zhipeng
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 9, 2023, : 10537 - 10545
  • [4] Multi-source heterogeneous core data acquisition method in edge computing nodes
    Xia, Hong
    Zhao, Mingdao
    Chen, Yanping
    Wang, Zhongmin
    Yu, Zhong
    Yang, Jingwei
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 382 - 385
  • [5] A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
    Yuan, Jie
    Li, Xiaoyong
    [J]. IEEE ACCESS, 2018, 6 : 23626 - 23638
  • [6] A Multi-source Feedback based Trust Calculation Mechanism for Edge Computing
    Yuan, Jie
    Li, Xiaoyong
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 819 - 824
  • [7] Performance analysis of multi-access edge computing networks for heterogeneous IoT systems
    Bebortta, Sujit
    Singh, Amit Kumar
    Senapati, Dilip
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 58 : 267 - 272
  • [8] Multi-source fusion-based security detection method for heterogeneous networks
    Wu, Hao
    Wang, Zhonghua
    [J]. COMPUTERS & SECURITY, 2018, 74 : 55 - 70
  • [9] MULTI-ACCESS MOBILE EDGE COMPUTING FOR HETEROGENEOUS IOT
    Zhang, Yan
    Wu, Yuan
    Moustafa, Hassnaa
    Tsang, Danny H. K.
    Leon-Garcia, Alberto
    Javaid, Usman
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) : 12 - 13
  • [10] Methods for aggregating multi-source heterogeneous data in the IoT based on digital twin technology
    Li, Min
    [J]. INTERNET TECHNOLOGY LETTERS, 2024, 7 (04)