학술논문

Computer Data Security and Encryption Algorithm Based on Mobile Edge Computing
Document Type
Conference
Source
2023 International Conference on Networking, Informatics and Computing (ICNETIC) ICNETIC Networking, Informatics and Computing (ICNETIC), 2023 International Conference on. :582-586 May, 2023
Subject
Computing and Processing
Multi-access edge computing
Data security
Computational modeling
Information leakage
Data models
Computer networks
User experience
Mobile edge computing
Encryption algorithm
Language
Abstract
With the rapid development of science and technology, data is increasing exponentially. Data security has become a problem that people pay close attention to. How to ensure data security has aroused people's thinking. In order to ensure the communication security of network data, this paper points out the security threats in computer network communication, clarifies the significance of data encryption technology, and analyzes the commonly used data encryption methods in computer network communication. In this paper, a computer data security application model based on edge computing is constructed. In this model, data redundancy elimination method and differential privacy protection algorithm are adopted successively. After removing duplicate data and obtaining good quality data, the computer data is privacy protected, and the data security processing based on edge computing is realized. After testing, the privacy protection budget value of the built model is 0.23, and the computer data information leakage ratio based on edge computing is the smallest. Under this condition, the maximum data information leakage ratio based on edge computing is reduced from 0.678 to 0.234, and the data security is significantly improved.