{"title":"Edge Computing Security of Mobile Communication System Based on Computer Algorithms","authors":"Jinna Zhang","doi":"10.1142/s0218843024500023","DOIUrl":null,"url":null,"abstract":"<p>With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8<span><math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"><mspace width=\".17em\"></mspace></math></span><span></span>s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.</p>","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cooperative Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1142/s0218843024500023","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.
期刊介绍:
The paradigm for the next generation of information systems (ISs) will involve large numbers of ISs distributed over large, complex computer/communication networks. Such ISs will manage or have access to large amounts of information and computing services and will interoperate as required. These support individual or collaborative human work. Communication among component systems will be done using protocols that range from conventional ones to those based on distributed AI. We call such next generation ISs Cooperative Information Systems (CIS).
The International Journal of Cooperative Information Systems (IJCIS) addresses the intricacies of cooperative work in the framework of distributed interoperable information systems. It provides a forum for the presentation and dissemination of research covering all aspects of CIS design, requirements, functionality, implementation, deployment, and evolution.