This paper was developed in response to research and application on the 5 G edge computing which includes 5 G edge computing security risks
5 G edge computing security protection requirements and 5 G edge computing security application. First of all
the paper focus on the 5 G edge computing security risk of network service
hardware environment
virtualization
edge computing platform
capability open
application
management
data
then introducing the corresponding security protection requirements of 5 G edge computing security risk. Take smart grid as an example to introduce 5 G edge computing security applications. So
this paper focuses on the research and application on the 5 G edge computing and it plays a good role for the 5 G edge computing research and application in the future.