weakening the effectiveness of security decision-
making. To this end, a dynamic update mechanism
for adaptive indicators can be constructed to track the
latest developments in technical standards and
security research in real time, and iteratively update
the indicators according to emerging risks and
technologies to ensure that the model can adapt to the
latest security needs. In addition, machine learning
methods are used to select key indicators that have a
significant impact on system security, and to ensure
that the indicator system has good scalability and can
be continuously enriched and improved as technology
evolves.
Another problem is the data collection dilemma
and quality bottleneck. The complex architecture and
limited resources of edge computing systems make it
difficult to collect safety data, and expert evaluation
is highly subjective, and there are omissions and
errors in objective collection, resulting in uneven data
quality and limited scale, which affects the accuracy
and generalization of the evaluation model. For
example, in industrial control networks, it is
impossible to comprehensively collect key security
parameters, which leads to the model misjudging
risks and affecting the allocation of security
resources. To solve this problem, a multifaceted
fusion data collection strategy can be innovated to
combine active detection and passive listening means
to comprehensively collect safety data. In addition,
blockchain technology is used to ensure the
trustworthiness and non-tamperability of the data,
improve the security and reliability of the data, and
expand the scope of data collection by introducing a
third-party data source to improve the quality of the
data and the generalization ability of the model.
Finally, the security evaluation model of edge
computing information system also faces the problem
of complexity of effectiveness validation. Existing
models lack unified validation standards and have a
single metric, which makes it difficult to
comprehensively measure the performance
advantages and disadvantages of the model, and
hinders the iterative improvement and application
promotion of the technology. To this end, a
comprehensive and standardized validation and
evaluation system can be established, and common
validation guidelines can be formulated to ensure that
different models can be effectively compared and
integrated with each other. At the same time, a
multidimensional evaluation index system can be
established, covering multiple dimensions such as
performance, safety, economic cost, etc., to
comprehensively evaluate the advantages and
disadvantages of the models. On this basis, a public
testing platform is established to provide a
standardized testing environment and data set, which
facilitates the validation and optimization of the
models by researchers and enterprises, and promotes
the rapid development and application promotion of
the technology (Ma & Li, 2018).
6 CONCLUSIONS
This paper provides a comprehensive overview of the
key areas of edge computing technology, especially
the latest research progress in task scheduling and
resource management, and information system
security. First, in terms of task scheduling and
resource management, this paper analyzes the
challenges facing edge computing, such as resource
occupancy prediction, task priority awareness, and
arithmetic slicing, and proposes solutions based on
machine learning, deep learning, and multi-
intelligence body collaboration. These solutions
effectively improve resource utilization, reduce task
latency, and enhance system reliability. Second, in
the field of information system security, with the
rapid development of edge computing, security issues
are becoming more and more prominent. Aiming at
the dynamic security risks in edge computing
environment, this paper explores new security
evaluation models such as combined-empowerment
gray clustering, PCA indicator screening, etc., which
have achieved remarkable results in improving the
accuracy and efficiency of security evaluation.
However, there are still some challenges in the
existing research, such as insufficient resource
prediction accuracy and difficulty in dynamically
evolving system security evaluation metrics. In the
future, edge computing will face problems such as
large-scale task scheduling, traffic burst prediction,
and system generalization capability, which require
the fusion of multi-source data, the improvement of
model adaptability, and the exploration of efficient
security policies. In conclusion, the research of edge
computing technology is still in continuous
development, and in the future, it will better serve the
Internet of Things, Industrial Internet and other fields
through intelligent and dynamic optimization
solutions to promote the process of digital
transformation.