Research on Security Evaluation Methods of Edge Computing Information Systems
Keqi Chen
2025
Abstract
With the rapid development of economy and science and technology, the demand for edge computing technology has expanded. Edge computing can provide caching and processing functions to realize the localization of computing power and resource storage. Under the high requirements of edge information system, the accuracy of its security evaluation and classification is also required to be improved. At the same time, due to the limited resources, the data scale should not be too large and not strictly obey the normal distribution, so the adaptability and accuracy of the traditional first-order grey clustering are insufficient, and the similarity of the maximum membership degree adjacent membership degree may lead to fuzzy judgment and reverse sorting results. Single empowerment method using subjective right confirmation method or objective right confirmation method alone will lead to inaccurate results. This review will discuss the security evaluation and grading model for edge information systems from the following aspects: overview of mainstream methods, overview of data sets and evaluation criteria, the current level of this direction, and the discussion of current problems and solutions. In this paper, some processing methods of the information system security evaluation and grading model of edge computing are discussed. In the subsequent work, further research can be carried out from the following two aspects: the more optimized solution of grey clustering, and whether the security evaluation and grading model can be applied to various scenarios.
DownloadPaper Citation
in Harvard Style
Chen K. (2025). Research on Security Evaluation Methods of Edge Computing Information Systems. In Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE; ISBN 978-989-758-765-8, SciTePress, pages 667-672. DOI: 10.5220/0013703900004670
in Bibtex Style
@conference{icdse25,
author={Keqi Chen},
title={Research on Security Evaluation Methods of Edge Computing Information Systems},
booktitle={Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE},
year={2025},
pages={667-672},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013703900004670},
isbn={978-989-758-765-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 2nd International Conference on Data Science and Engineering - Volume 1: ICDSE
TI - Research on Security Evaluation Methods of Edge Computing Information Systems
SN - 978-989-758-765-8
AU - Chen K.
PY - 2025
SP - 667
EP - 672
DO - 10.5220/0013703900004670
PB - SciTePress