Practice on edge cloud security of telecom operators

Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of netwo...

Full description

Saved in:
Bibliographic Details
Main Authors: Le ZHANG, Hongyuan MA
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2023-04-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530857190326272
author Le ZHANG
Hongyuan MA
author_facet Le ZHANG
Hongyuan MA
author_sort Le ZHANG
collection DOAJ
description Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of network edge cloud were discussed firstly.Then, the limitations of the security construction mode in the edge cloud scenario for the traditional cloud were analyzed.Finally, an innovative network edge cloud security construction plan was proposed, and the province’s edge cloud security construction was carried out uniformly.The comparison was completed from the perspective of practical application, and the advantages of the innovative edge cloud construction plan was verified.
format Article
id doaj-art-ba199cb282a746fea095f4f5b361d04b
institution Kabale University
issn 1000-0801
language zho
publishDate 2023-04-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-ba199cb282a746fea095f4f5b361d04b2025-01-15T02:58:52ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012023-04-013916517259569144Practice on edge cloud security of telecom operatorsLe ZHANGHongyuan MAAbstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of network edge cloud were discussed firstly.Then, the limitations of the security construction mode in the edge cloud scenario for the traditional cloud were analyzed.Finally, an innovative network edge cloud security construction plan was proposed, and the province’s edge cloud security construction was carried out uniformly.The comparison was completed from the perspective of practical application, and the advantages of the innovative edge cloud construction plan was verified.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/5Gedge cloudnetwork securitytoB businessUPF security
spellingShingle Le ZHANG
Hongyuan MA
Practice on edge cloud security of telecom operators
Dianxin kexue
5G
edge cloud
network security
toB business
UPF security
title Practice on edge cloud security of telecom operators
title_full Practice on edge cloud security of telecom operators
title_fullStr Practice on edge cloud security of telecom operators
title_full_unstemmed Practice on edge cloud security of telecom operators
title_short Practice on edge cloud security of telecom operators
title_sort practice on edge cloud security of telecom operators
topic 5G
edge cloud
network security
toB business
UPF security
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/
work_keys_str_mv AT lezhang practiceonedgecloudsecurityoftelecomoperators
AT hongyuanma practiceonedgecloudsecurityoftelecomoperators