安全驱动的边云数据协同策略研究
Research on Security Driven Edge Cloud Data Collaboration Strategy
DOI: 10.12677/CSA.2023.1311205, PDF,   
作者: 张王俊, 陈 宇, 朱旻捷, 彭炜舟:国网上海市电力公司数字化工作部,上海;赵忠军:上海欣能信息科技发展有限公司安全生产部,上海
关键词: 边缘计算云计算数据协同安全存储策略Edge Computing Cloud Computing Data Collaboration Secure Storage Policy
摘要: 分布式计算虽然能弥补传统集中式计算网络拥堵、计算能力低的缺点,但对边缘设备隐私安全和可信感知存在不足。随着数字新技术的快速发展,利用新一代信息技术满足边云现场环境下的边云数据协同需求日益增长。本论文首先通过研究边缘计算和云计算的发展趋势,识别边云协同关键技术,然后分析边云数据协同面临的数据传输安全、数据通信安全、数据存储安全等问题,得出边云数据协同安全风险方法措施,最后结合边云现场环境下的工业信息物理系统数据协同安全需求,提出了一种基于边云协同的动态数据安全存储策略,该策略以“事前准备–事中防御–事后响应”为指导思想,既能够充分利用云计算和边缘计算的技术优势,又可以满足数据协同的安全性和实时性要求。
Abstract: Although distributed computing can compensate for the shortcomings of traditional centralized computing network congestion and low computing power, it has shortcomings in privacy security and trustworthiness perception of edge devices. With the rapid development of new digital tech-nologies, the demand for edge cloud data collaboration in edge cloud on-site environments is in-creasingly increasing through the use of next-generation information technology. This paper first identifies the key technologies of edge cloud collaboration by studying the development trend of edge computing and cloud computing, then analyzes the data transmission security, data commu-nication security, data storage security and other issues faced by edge cloud data collaboration, and obtains the risk methods and measures of edge cloud data collaboration security. Finally, combined with the data collaboration security requirements of industrial information physics systems under the edge cloud on-site environment, a dynamic data security storage strategy based on edge cloud collaboration is proposed. The strategy takes “preparation in advance-defense in the event-response after the event” as the guiding ideology, which can not only make full use of the technical advantages of cloud computing and edge computing, but also meet the security and re-al-time requirements of data collaboration.
文章引用:张王俊, 陈宇, 赵忠军, 朱旻捷, 彭炜舟. 安全驱动的边云数据协同策略研究[J]. 计算机科学与应用, 2023, 13(11): 2062-2071. https://doi.org/10.12677/CSA.2023.1311205

参考文献

[1] 王秋华, 吴国华, 魏东晓, 等. 工业互联网安全产业发展态势及路径研究[J]. 中国工程科学, 2021, 23(2): 46-55.
[2] 伍育红, 胡向东. 工业互联网网络传输安全问题研究[J]. 计算机科学, 2020, 47(1): 360-363.
[3] 陈园, 陈铁明, 宋琪杰, 等. 一种面向工业互联网终端的通用安全服务框架[J]. 电信科学, 2020, 36(3): 19-26.
[4] 汪允敏, 李挥, 王菡, 等. 区块链在工业互联网标识数据管理策略研究[J]. 计算机工程与应用, 2020, 56(7): 1-7.
[5] 徐雪松, 金泳, 曾智, 等. 应用于工业互联网数据安全的分层轻量级高通量区块链方法[J]. 计算机集成制造系统, 2019, 25(12): 258-266.
[6] Climent, J.-J., Napp, D., Perea, C., et al. (2015) Maximum Distance Separable 2D Convolutional Codes. IEEE Transactions on Information Theory, 62, 669-680. [Google Scholar] [CrossRef