The Value and Significance of the Security Evaluation Model for Information Systems in Edge Computing

Yanzheng Li

2025

Abstract

With the advancement of technology, edge computing—a novel technology for data processing at the edge—has increasingly integrated with fields such as fifth-generation mobile communication (5G), the Internet of Things (IoT), and the Internet of Vehicles (IoV). However, due to the decentralized nature of edge architectures, terminal nodes are more susceptible to exposure in resource-constrained and low-trust complex network environments. Existing security evaluation standards and models for edge information systems still face shortcomings in terms of comprehensiveness, scientific rigor, and efficiency. Addressing these issues, the study of security evaluation models for edge computing information systems holds significant importance. First, traditional evaluation methods perform poorly in scenarios with limited data and non-strict normal distributions, highlighting the need for high-accuracy security evaluation models. Second, edge computing operates under resource constraints, and traditional fuzzy evaluation models require optimization in terms of resource consumption and adaptability, necessitating the development of efficient security evaluation models. Lastly, the dynamic characteristics of edge systems demand the construction of security evaluation models capable of adapting to rapid changes in network topology while ensuring the consistency and scientific validity of security evaluation benchmarks. This paper explores strategies for improving security assessment models for edge computing information systems and provides an overview of common methods, detection indicators, and existing achievements. Future efforts should focus on improving and optimizing edge information security evaluation models by integrating existing standards and protection frameworks to meet the demands of high accuracy, high efficiency, and dynamic adaptability.

Download


Paper Citation


in Harvard Style

Li Y. (2025). The Value and Significance of the Security Evaluation Model for Information Systems in Edge Computing. In Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE; ISBN 978-989-758-765-8, SciTePress, pages 33-39. DOI: 10.5220/0013677700004670


in Bibtex Style

@conference{icdse25,
author={Yanzheng Li},
title={The Value and Significance of the Security Evaluation Model for Information Systems in Edge Computing},
booktitle={Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE},
year={2025},
pages={33-39},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013677700004670},
isbn={978-989-758-765-8},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE
TI - The Value and Significance of the Security Evaluation Model for Information Systems in Edge Computing
SN - 978-989-758-765-8
AU - Li Y.
PY - 2025
SP - 33
EP - 39
DO - 10.5220/0013677700004670
PB - SciTePress