fluctuations and discrepancies, and single-weight
assignment methods are easily influenced by
subjective factors or extreme data, thereby
compromising the accuracy of system evaluation
results. Consequently, it is necessary to adapt and
improve these methods to develop high-accuracy
models (Yuan et al., 2022).
Second, edge information systems are constrained
by limited resources. Traditional fuzzy evaluation
models still have significant optimization potential in
terms of resource consumption. Additionally, the
adaptability of traditional models in scenarios with
limited data must be addressed. This necessitates the
development of efficient security evaluation models
that reduce computational demands while
maintaining accuracy (Sun & Yu, 2019).
Finally, the spatiotemporal states of nodes in edge
information systems may change rapidly, resulting in
significant fluctuations in network topology and
status. Thus, it is essential to build dynamic security
evaluation models that extend beyond static models
to accommodate dynamic scenarios and meet the
demands of adaptive evaluation. Simultaneously,
these models must ensure the consistency of security
evaluation benchmarks to maintain the scientific rigor
of dynamic system security evaluations (Wang & Xi,
2023).
In summary, existing research outcomes fall short
of addressing the demands for high accuracy, high
efficiency, and dynamic evaluation in edge
information systems. It is imperative to adapt and
refine the current edge information security
evaluation models based on existing standards for
information system security, edge computing
security, and edge computing protection architectures
to meet these requirements effectively.
2 MAINSTREAM METHODS FOR
SECURITY EVALUATION
MODELS OF EDGE
COMPUTING INFORMATION
SYSTEMS
2.1 Analytic Hierarchy Process (AHP)
The Analytic Hierarchy Process (AHP) is a multi-
level, multi-criteria decision-making method with
significant applications in system security evaluation.
Its fundamental steps involve constructing a
hierarchical structure for security evaluation, which
typically divides the security assessment into three
levels: the goal layer, the criterion layer, and the
indicator layer.
The goal layer represents the overall security of
the system, while the criterion layer is subdivided into
several core domains, such as data security, network
security, and device security. Each criterion layer
contains multiple relevant indicators. For instance,
the data security criterion may include indicators such
as data integrity, access control, and encryption
techniques. The network security criterion may
encompass network traffic encryption, firewalls, and
other measures, while device security pertains to
hardware security, device protection, and related
aspects.
Based on this structure, experts assign weights to
each indicator using a scoring method. Experts
leverage their practical experience and understanding
of various aspects of security, along with the system's
actual conditions, to evaluate the importance of each
security indicator and assign corresponding weights.
This process reflects both professional knowledge
and ensures the rationality and scientific validity of
the evaluation.
Subsequently, the weighted sum method is used
to compute the comprehensive scores for each
criterion layer and the goal layer. This involves
multiplying each indicator's score by its
corresponding weight and summing the results.
Finally, the overall security evaluation of the system
is obtained by analysing the comprehensive scores.
The advantages of AHP lie in its clear structure,
ease of understanding, and ability to effectively
integrate experts' subjective judgments. These
features make it well-suited for security analysis and
decision-making support in complex systems.
2.2 Fuzzy Comprehensive Evaluation
Method
The fuzzy comprehensive evaluation method, based
on fuzzy mathematics, is designed to handle
uncertainty and ambiguity in complex systems,
making it particularly valuable for system security
evaluation (Yi, Cao, & Song, 2020).
The process begins with establishing an
evaluation indicator set, which serves as the
foundation for fuzzy comprehensive evaluation. For
instance, when assessing data security, indicators
might include data encryption, secure data
transmission, and storage security. For network
security, indicators could encompass network access
control, traffic monitoring, and intrusion detection.
Each indicator represents a specific aspect of the