Secure network slicing deployment in edge computing

Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao
{"title":"Secure network slicing deployment in edge computing","authors":"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao","doi":"10.1109/iccc52777.2021.9580199","DOIUrl":null,"url":null,"abstract":"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccc52777.2021.9580199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.
边缘计算中的安全网络切片部署
网络切片作为5G的一项关键技术,可以满足不同用户的不同需求,实现定制化服务。在一些uRLLC应用场景中,网络切片可以与边缘计算技术相结合,更好地实现低时延服务,保证数据不上传到核心网。它可以实现数据的本地存储和计算,更好地保护用户数据的隐私。因此,将网络切片与边缘计算相结合是很有意义的。为了实现这一点,我们首先提出了边缘计算中的网络切片架构,并实现了用户访问认证,以证明该架构的优势。其次,用信任程度来描述安全约束,以满足安全需求。最后,我们将模型表述为一个混合整数线性规划(MILP),然后根据一个典型解对我们的解进行评估。仿真结果表明,该方案能够提供一种安全、高效的资源分配方案。总之,本文可以在边缘计算中部署安全网络切片时参考。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信