ID 原文 译文
45716 然后,在调研和分析大量物联网操作系统相关文献的基础上,从构建完整安全系统的角度对现有物联网操作系统安全研究成果进行有效的分类和分析;进一步指出了物联网操作系统安全所面临的挑战和机遇,总结了物联网操作系统安全的研究现状; Secondly, On the basis of the survey of research related to IoT operating system, the research was discussed and analyzed from the view of building a comprehensive security system, then security challenges and opportunities which the IoT system faced were pointed out, and the research status of the security of the IoT operating system was summarized.
45717 最后,结合现有研究的不足指出了物联网操作系统安全未来的热点研究方向,并特别指出了物联网系统生存技术这一新的研究方向。 Finally, the promising future study directions in the IoT operating system security field were discussed based on the drawbacks of the existing researches, particularly, the IoT system survival technology as a new research direction was pointed out.
45718 随着物联网、大数据和 5G 网络的快速发展和广泛应用,传统的云计算无法处理网络边缘设备所产生的海量数据, With the rapid development and extensive application of the Internet of things (IoT), big data and 5G network architecture, the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.
45719 因此,边缘计算应运而生。 To solve such dilemma, the edge computing which deploys the cloud services in the edge network has been envisioned.
45720 然而,由于边缘计算的内容感知、实时计算、并行处理等开放特性,使在云计算环境下就已经存在的数据安全与隐私问题变得更加突出。 Mean-while, the unique features of edge computing, such as content perception, real-time computing, parallel processing and etc., has also introduced new security problems especially the data security and privacy issues.
45721 首先,阐述了边缘计算中数据安全与隐私保护的研究背景,提出以数据安全为中心的研究体系架构。 Firstly, the background and challenges of data security and privacy-preserving in edge computing were described, and then the research architectture of data security and privacy-preserving was presented.
45722 其次,围绕数据安全、访问控制、身份认证和隐私保护等关键技术, Secondly, the key technologies of data security, access control,identity authentication and privacy-preserving were summarized.
45723 第三,综述了近年来提出的可能适用于边缘计算数据安全与隐私保护的最新研究成果,并就方案的可扩展性和适用性进行分析讨论。 Thirdly, the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.
45724 最后,介绍了一些目前比较适用的边缘计算实例,指出一些重要的研究方向和研究建议。 Finally, some potential re-search points of edge computing data security and privacy-preserving were given, and the direction of future research work was pointed out.
45725 为了研究信息安全投资外部性的影响,将 Gordon-Loeb 模型扩展到多组织博弈环境下, In order to study the impacts of externalities of information security investment, the Gordon-Loeb model was extended to a multi-organization game environment.