{"title":"边缘计算中电力终端数据安全机制综述","authors":"Yixin Jiang, Yunan Zhang, Aidong Xu, Xiaoyun Kuang, Jiaxiao Meng, Hongshan Chu","doi":"10.1109/ICEI49372.2020.00013","DOIUrl":null,"url":null,"abstract":"The number of power terminals is constantly increasing, and the amount of data to be processed in cloud computing centers is growing exponentially, which requires the computing capacity and data security of computing centers to be continuously improved. The emergence of edge computing solves this problem well. During the application process of edge computing in power systems, power terminals are designed to complete more calculation and storage work. Besides, data security of power terminals is becoming more and more important. That is because the power terminals are widely distributed in a complex and diverse environment. The communication channel is open and easy to destroy, causing serious information security threats. This paper collects global research on data encryption, privacy protection, auditing, and other aspects of data security through the research and analysis of security requirements, as well as research on terminal identity authentication, and eventually reviews various methods.","PeriodicalId":418017,"journal":{"name":"2020 IEEE International Conference on Energy Internet (ICEI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Overview: Data Security Mechanism of Power Terminal in Edge Computing\",\"authors\":\"Yixin Jiang, Yunan Zhang, Aidong Xu, Xiaoyun Kuang, Jiaxiao Meng, Hongshan Chu\",\"doi\":\"10.1109/ICEI49372.2020.00013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of power terminals is constantly increasing, and the amount of data to be processed in cloud computing centers is growing exponentially, which requires the computing capacity and data security of computing centers to be continuously improved. The emergence of edge computing solves this problem well. During the application process of edge computing in power systems, power terminals are designed to complete more calculation and storage work. Besides, data security of power terminals is becoming more and more important. That is because the power terminals are widely distributed in a complex and diverse environment. The communication channel is open and easy to destroy, causing serious information security threats. This paper collects global research on data encryption, privacy protection, auditing, and other aspects of data security through the research and analysis of security requirements, as well as research on terminal identity authentication, and eventually reviews various methods.\",\"PeriodicalId\":418017,\"journal\":{\"name\":\"2020 IEEE International Conference on Energy Internet (ICEI)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Energy Internet (ICEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEI49372.2020.00013\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Energy Internet (ICEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEI49372.2020.00013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Overview: Data Security Mechanism of Power Terminal in Edge Computing
The number of power terminals is constantly increasing, and the amount of data to be processed in cloud computing centers is growing exponentially, which requires the computing capacity and data security of computing centers to be continuously improved. The emergence of edge computing solves this problem well. During the application process of edge computing in power systems, power terminals are designed to complete more calculation and storage work. Besides, data security of power terminals is becoming more and more important. That is because the power terminals are widely distributed in a complex and diverse environment. The communication channel is open and easy to destroy, causing serious information security threats. This paper collects global research on data encryption, privacy protection, auditing, and other aspects of data security through the research and analysis of security requirements, as well as research on terminal identity authentication, and eventually reviews various methods.