Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protection method based on edge cloud system

A network security protection and cloud system technology, which is applied in the field of network security protection based on edge cloud systems, can solve problems such as system error perception information, affecting system work efficiency, system failure to allocate and process tasks, etc., to achieve the goal of ensuring network security Effect

Active Publication Date: 2022-04-15
BEIJING JIAOTONG UNIV +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current edge cloud system in the prior art lacks the corresponding network security technology to ensure the communication security between the cloud computing platform and the edge computing server and between the edge computing server and the IoT device
If a network attacker attacks the communication between the cloud computing platform and the edge computing server and tampers with the tasks issued by the cloud computing platform, the system will not be able to process the tasks in real time, seriously affecting the work efficiency of the system; Forging the reply of the edge computing server will cause the system to be unable to further complete the assignment and processing of tasks
If a network attacker launches an attack on the communication between the edge computing server and the IoT device, the system will get wrong perception information, which will seriously affect the system's decision-making and response, causing serious and irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method based on edge cloud system
  • Network security protection method based on edge cloud system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention will be described in detail below, and examples of the embodiments are illustrated in the drawings, in which the same or similar reference numerals are denoted by the same or similar elements or elements having the same or similar functions. The following is exemplary, and is intended to be illustrative of the invention, without interpretation of the invention.

[0027] Those skilled in the art will appreciate that unless specifically declared, the singular form "one", "one", "" "and" "", and "" "can also include multiple forms. It should be further understood that the phrase "comprising" in the specification of the present invention means that there is the features, integers, steps, operations, elements, and / or components, but do not exclude presence or addition of one or more other features. Integral, steps, operations, components, components, and / or groups. It should be understood that when the components are "connected" or "coupl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security protection method based on an edge cloud system. The method comprises the following steps: performing symmetric encryption on a command issued to an edge computing server by a cloud computing platform through an encryption algorithm, and performing digital signature on the command issued to the edge computing server by the cloud computing platform and an identity identifier of the cloud computing platform through a Hash algorithm; the reply uploaded to the cloud computing platform by the edge computing server is symmetrically encrypted through an encryption algorithm, and the reply uploaded to the cloud computing platform by the edge computing server and the identity identifier of the edge computing server are digitally signed through a Hash algorithm; a security server is established for communication between the edge computing server and the Internet of Things equipment, and the security server distributes different secret keys for communication between different Internet of Things equipment and the edge computing server. According to the invention, secure communication between the edge computing servers and between the edge computing servers and the Internet of Things equipment is realized, and the network security of the system is guaranteed.

Description

Technical field [0001] The present invention relates to the field of network security technology, and more particularly to a network security method based on edge cloud systems. Background technique [0002] In recent years, with the rapid development of all things and wireless communication technology, the number of devices on the edge side of the network and the amount of data generated are rapidly increased. In this context, traditional cloud computing models have problems with poor real-time sex, short bandwidth, high energy consumption and adverse privacy protection, so the edge calculation model calculated by mass data generated by the edge device has become a mainstream resolution. Program. [0003] Objects of edge computing operations include downlink data from the cloud computing platform and uplink data from the Internet of Things devices, so there is a number of interactive communication between edge computing servers, cloud computing platforms, and Internet access dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/06G16Y10/75G16Y40/50
Inventor 张振江赵耀张阳刘赛贾朝心韩野林巍武帅熊菲
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products