当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A security integration model for private data of intelligent mobile communication based on edge computing
Computer Communications ( IF 6 ) Pub Date : 2020-09-08 , DOI: 10.1016/j.comcom.2020.08.026
Xiang Chen

This paper proposes a security integration model of mobile intelligent private data for edge computing. According to the characteristics of the heterogeneous network of edge computing networks, the network is layered according to the mobile intelligent private data structure. The homomorphism encryption algorithm is adopted to enable private data to be transmitted and stored in the form of ciphertext on the edge network and the mobile terminal. The encryption model ensures that the device data is not peeped by malicious attackers. Besides, the application layer system model is designed to enable service providers to integrate their hardware resources and provide a unified edge computing solution for different data owners. The experiment evaluated its encryption performance and system availability. An edge network security defense model based on a mean-field game is established, and an edge network security defense algorithm is proposed. Based on the study of the relationship between the individual edge network equipment’s optimal defense strategy and the overall edge network’s optimal defense strategy, the individual cost of the edge network equipment is analyzed by proving the existence of the edge network equipment balance. The optimal conditions between the overall cost of the edge network are given under this condition. The simulation results showed that for large-scale edge network devices, the model realized the unity of the optimal defense strategies of the individual edge network devices and the entire edge network, and effectively reduces the consumption of computing resources of the edge network devices Because all migration strategies allow all devices to migrate their computing tasks to MBS, leading to severe uplink and downlink congestion, wireless transmission energy consumption has increased dramatically. The energy consumption of migration calculation is higher than that of local calculation.



中文翻译:

基于边缘计算的智能移动通信私有数据安全集成模型

本文提出了一种用于边缘计算的移动智能私有数据安全集成模型。根据边缘计算网络异构网络的特点,根据移动智能私有数据结构对网络进行分层。采用同态加密算法,可以在边缘网络和移动终端上以密文形式传输和存储私有数据。加密模型可确保恶意攻击者不会窥探设备数据。此外,应用层系统模型旨在使服务提供商能够集成其硬件资源,并为不同的数据所有者提供统一的边缘计算解决方案。实验评估了其加密性能和系统可用性。建立了基于均值博弈的边缘网络安全防御模型,提出了一种边缘网络安全防御算法。在对单个边缘网络设备的最优防御策略与整体边缘网络的最优防御策略之间的关系进行研究的基础上,通过证明边缘网络设备平衡的存在来分析边缘网络设备的个体成本。在此条件下给出了边缘网络总成本之间的最佳条件。仿真结果表明,对于大型边缘网络设备,该模型实现了单个边缘网络设备和整个边缘网络的最优防御策略的统一;并有效减少边缘网络设备的计算资源消耗由于所有迁移策略都允许所有设备将其计算任务迁移到MBS,从而导致严重的上,下行拥塞,因此无线传输能耗大大增加。迁移计算的能耗高于局部计算的能耗。

更新日期:2020-09-10
down
wechat
bug