Research Article
The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence
Table 1
The sources of security risks in the five fields for edge computing.
| Variety of risks | Terminal assets are quite limited | Terminals with a variety of protocols for communication | Engineering for a new organization | Assets in the edge hub that are restricted | Actual insurance of edge hubs is insufficient | Edge hubs have a strong environmental effect |
| Controlling access | Available | Available | Available | | Available | Available | Management personnel | Available | Available | | | Available | | Protection against security threats | Available | | | Available | Available | | Mitigation of assault | Available | | Available | Available | Available | Available | Oddity detection | | | | Available | Available | |
|
|