An Overview: Data Security Mechanism of Power Terminal in Edge Computing

Yixin Jiang, Yunan Zhang, Aidong Xu, Xiaoyun Kuang, Jiaxiao Meng, Hongshan Chu
{"title":"An Overview: Data Security Mechanism of Power Terminal in Edge Computing","authors":"Yixin Jiang, Yunan Zhang, Aidong Xu, Xiaoyun Kuang, Jiaxiao Meng, Hongshan Chu","doi":"10.1109/ICEI49372.2020.00013","DOIUrl":null,"url":null,"abstract":"The number of power terminals is constantly increasing, and the amount of data to be processed in cloud computing centers is growing exponentially, which requires the computing capacity and data security of computing centers to be continuously improved. The emergence of edge computing solves this problem well. During the application process of edge computing in power systems, power terminals are designed to complete more calculation and storage work. Besides, data security of power terminals is becoming more and more important. That is because the power terminals are widely distributed in a complex and diverse environment. The communication channel is open and easy to destroy, causing serious information security threats. This paper collects global research on data encryption, privacy protection, auditing, and other aspects of data security through the research and analysis of security requirements, as well as research on terminal identity authentication, and eventually reviews various methods.","PeriodicalId":418017,"journal":{"name":"2020 IEEE International Conference on Energy Internet (ICEI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Energy Internet (ICEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEI49372.2020.00013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The number of power terminals is constantly increasing, and the amount of data to be processed in cloud computing centers is growing exponentially, which requires the computing capacity and data security of computing centers to be continuously improved. The emergence of edge computing solves this problem well. During the application process of edge computing in power systems, power terminals are designed to complete more calculation and storage work. Besides, data security of power terminals is becoming more and more important. That is because the power terminals are widely distributed in a complex and diverse environment. The communication channel is open and easy to destroy, causing serious information security threats. This paper collects global research on data encryption, privacy protection, auditing, and other aspects of data security through the research and analysis of security requirements, as well as research on terminal identity authentication, and eventually reviews various methods.
边缘计算中电力终端数据安全机制综述
电力终端数量不断增加,云计算中心处理的数据量呈指数级增长,这就要求计算中心的计算能力和数据安全性不断提高。边缘计算的出现很好地解决了这个问题。在边缘计算在电力系统中的应用过程中,电力终端需要完成更多的计算和存储工作。此外,电力终端的数据安全也变得越来越重要。这是因为电力终端分布广泛,环境复杂多样。通信通道是开放的,容易被破坏,造成严重的信息安全威胁。本文通过对安全需求的研究和分析,以及对终端身份认证的研究,收集了全球在数据加密、隐私保护、审计等数据安全方面的研究成果,并对各种方法进行了综述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信