{"title":"边缘计算的安全考虑","authors":"J. Acken, Naresh Sehgal","doi":"10.5121/CSIT.2019.90915","DOIUrl":null,"url":null,"abstract":"Present state of edge computing is an environment of different computing capabilities connecting via a wide variety of communication paths. This situation creates both great operational capability opportunities and unimaginable security problems. This paper emphasizes that the traditional approaches to security of identifying a security threat and developing the technology and policies to defend against that threat are no longer adequate. The wide variety of security levels, computational capabilities, and communication channels requires a learning, responsive, varied, and individualized approach to information security. We describe a classification of the nature of transactions with respect to security based upon relationships, history, trust status, requested actions and resulting response choices. Problem is that the trust evaluation has to be individualized between each pair of devices participating in edge computing. We propose that each element in the edge computing world utilizes a localized ability to establish an adaptive learning trust model with each entity that communicates with the element. Specifically, the model we propose increments or decrements the value of trust score based upon each interaction.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Considerations for Edge Computing\",\"authors\":\"J. Acken, Naresh Sehgal\",\"doi\":\"10.5121/CSIT.2019.90915\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Present state of edge computing is an environment of different computing capabilities connecting via a wide variety of communication paths. This situation creates both great operational capability opportunities and unimaginable security problems. This paper emphasizes that the traditional approaches to security of identifying a security threat and developing the technology and policies to defend against that threat are no longer adequate. The wide variety of security levels, computational capabilities, and communication channels requires a learning, responsive, varied, and individualized approach to information security. We describe a classification of the nature of transactions with respect to security based upon relationships, history, trust status, requested actions and resulting response choices. Problem is that the trust evaluation has to be individualized between each pair of devices participating in edge computing. We propose that each element in the edge computing world utilizes a localized ability to establish an adaptive learning trust model with each entity that communicates with the element. Specifically, the model we propose increments or decrements the value of trust score based upon each interaction.\",\"PeriodicalId\":248929,\"journal\":{\"name\":\"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/CSIT.2019.90915\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/CSIT.2019.90915","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Present state of edge computing is an environment of different computing capabilities connecting via a wide variety of communication paths. This situation creates both great operational capability opportunities and unimaginable security problems. This paper emphasizes that the traditional approaches to security of identifying a security threat and developing the technology and policies to defend against that threat are no longer adequate. The wide variety of security levels, computational capabilities, and communication channels requires a learning, responsive, varied, and individualized approach to information security. We describe a classification of the nature of transactions with respect to security based upon relationships, history, trust status, requested actions and resulting response choices. Problem is that the trust evaluation has to be individualized between each pair of devices participating in edge computing. We propose that each element in the edge computing world utilizes a localized ability to establish an adaptive learning trust model with each entity that communicates with the element. Specifically, the model we propose increments or decrements the value of trust score based upon each interaction.