A security integration model for private data of intelligent mobile communication based on edge computing

被引:6
|
作者
Chen, Xiang [1 ]
机构
[1] Jiangsu Normal Univ, Kewen Coll, Xuzhou 221000, Jiangsu, Peoples R China
关键词
Intelligent mobile communication; Edge computing; Security integration model; Private data; BLOCKCHAIN; INTERNET; CLOUD;
D O I
10.1016/j.comcom.2020.08.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a security integration model of mobile intelligent private data for edge computing. According to the characteristics of the heterogeneous network of edge computing networks, the network is layered according to the mobile intelligent private data structure. The homomorphism encryption algorithm is adopted to enable private data to be transmitted and stored in the form of ciphertext on the edge network and the mobile terminal. The encryption model ensures that the device data is not peeped by malicious attackers. Besides, the application layer system model is designed to enable service providers to integrate their hardware resources and provide a unified edge computing solution for different data owners. The experiment evaluated its encryption performance and system availability. An edge network security defense model based on a mean-field game is established, and an edge network security defense algorithm is proposed. Based on the study of the relationship between the individual edge network equipment's optimal defense strategy and the overall edge network's optimal defense strategy, the individual cost of the edge network equipment is analyzed by proving the existence of the edge network equipment balance. The optimal conditions between the overall cost of the edge network are given under this condition. The simulation results showed that for large-scale edge network devices, the model realized the unity of the optimal defense strategies of the individual edge network devices and the entire edge network, and effectively reduces the consumption of computing resources of the edge network devices Because all migration strategies allow all devices to migrate their computing tasks to MBS, leading to severe uplink and downlink congestion, wireless transmission energy consumption has increased dramatically. The energy consumption of migration calculation is higher than that of local calculation.
引用
收藏
页码:204 / 211
页数:8
相关论文
共 50 条
  • [1] A Novel Nodes Data Security Communication Model of Internet of Vehicles Based on Mobile Edge Computing
    Xu, Zengyong
    [J]. International Journal of Network Security, 2024, 26 (02) : 329 - 337
  • [2] Edge Computing Security of Mobile Communication System Based on Computer Algorithms
    Zhang, Jinna
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2024,
  • [3] Financial Data Security Management Method and Edge Computing Platform Based on Intelligent Edge Computing and Big Data
    Luo, Yanni
    [J]. IETE JOURNAL OF RESEARCH, 2023, 69 (08) : 5187 - 5195
  • [4] Research on intelligent computing offloading model based on reputation value in mobile edge computing
    Qi, Jin
    Sun, Hairong
    Gong, Kun
    Xu, Bin
    Zhang, Shunyi
    Sun, Yanfei
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 141 - 151
  • [5] Intelligent mobile edge computing for IoT big data
    Gwanggil Jeon
    Marcelo Albertini
    Valerio Bellandi
    Abdellah Chehri
    [J]. Complex & Intelligent Systems, 2022, 8 : 3595 - 3601
  • [6] Intelligent mobile edge computing for IoT big data
    Jeon, Gwanggil
    Albertini, Marcelo
    Bellandi, Valerio
    Chehri, Abdellah
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (05) : 3595 - 3601
  • [7] Mobile neural intelligent information system based on edge computing with interactive data
    Zhang, Yucheng
    Li, Yang
    Wang, Haoxiang
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (09): : 4329 - 4341
  • [8] Mobile neural intelligent information system based on edge computing with interactive data
    Yucheng Zhang
    Yang Li
    Haoxiang Wang
    [J]. Neural Computing and Applications, 2021, 33 : 4329 - 4341
  • [9] Security Analysis of Intelligent System Based on Edge Computing
    Han, Yibo
    Zhang, Weiwei
    Zhang, Zheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing
    Zhou, Zhou
    Shojafar, Mohammad
    Abawajy, Jemal
    Yin, Hui
    Lu, Hongming
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (01): : 238 - 247