{"title":"Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture","authors":"Peng Li, Jianing Du","doi":"10.1002/nem.70009","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6<sup>th</sup> Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.</p>\n </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.70009","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6th Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.
期刊介绍:
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.