浏览全部资源
扫码关注微信
[ "粟栗(1981- ),男,博士,中国移动通信有限公司研究院安全技术研究所副所长、教授级高级工程师,长期从事移动通信网安全技术研究工作,先后承担多个国家重大专项,累计申请发明专利 50 余项、发表科技论文20余篇,曾获得省部级科学技术奖7项" ]
[ "陆黎(1991- ),女,中国移动通信有限公司研究院安全技术研究所网络安全研究员,主要从事移动通信网加密通信及数据安全技术方面的研究工作" ]
[ "张星(1980- ),男,现就职于中国移动通信有限公司研究院安全技术研究所,长期从事大数据、数据安全等方面的研究工作" ]
[ "刘畅(1992- ),男,中国移动通信有限公司研究院安全所网络安全研究员,主要从事5G通信网络安全技术研究及5G安全标准化工作" ]
网络出版日期:2021-04,
纸质出版日期:2021-04-20
移动端阅览
粟栗, 陆黎, 张星, 等. 基于图数据库的5G数据流转安全防护机制[J]. 电信科学, 2021,37(4):28-36.
Li SU, Li LU, Xing ZHANG, et al. Graph database based security protection mechanism of 5G network data flow[J]. Telecommunications science, 2021, 37(4): 28-36.
粟栗, 陆黎, 张星, 等. 基于图数据库的5G数据流转安全防护机制[J]. 电信科学, 2021,37(4):28-36. DOI: 10.11959/j.issn.1000-0801.2021058.
Li SU, Li LU, Xing ZHANG, et al. Graph database based security protection mechanism of 5G network data flow[J]. Telecommunications science, 2021, 37(4): 28-36. DOI: 10.11959/j.issn.1000-0801.2021058.
5G 网络与关乎国计民生的政务、医疗、金融等行业紧密融合,5G 网络所承载数据的安全性至关重要。首先对5G数据及流转场景进行了分析,然后对5G数据进行分类分级;结合数据全生命周期防护要求,创新提出了一种基于图数据库的5G数据安全标记模型,能同时满足静态分类分级与动态流转防护的需求。以该模型为基础,从节点自身安全、数据流转监控及数据安全风险处置3个方面构建了5G数据安全防护机制,实现了对5G数据的全生命周期防护。
As the 5G mobile network is closely integrated with government
medical
financial and other industries related to national economy and people’s livelihood
the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed
then 5G data was classified.Combining with the protection requirements of the life cycle of data
an innovative 5G data security labeling model based on graph database was proposed
which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model
5G data security protection mechanism was constructed from three aspects of node security
data flow monitoring and data security risk disposal
realizing life-cycle protection of 5G data.
ITU-R . IMT vision–framework and overall objectives of the future development of IMT for 2020 and beyond:M.2083-0 [S ] . 2015 .
黄宇红 , 王晓云 , 刘光毅 . 5G 移动通信系统概述 [J ] . 电子技术应用 , 2017 , 43 ( 8 ): 3 - 7 .
HUANG Y H , WANG X Y , LIU G Y . Overview of 5G mobile communication system [J ] . Application of Electronic Technique , 2017 , 43 ( 8 ): 3 - 7 .
张鉴 , 唐洪玉 , 刘文韬 , 等 . 面向云网融合的电信网安全防护体系参考架构 [J ] . 电信科学 , 2020 , 36 ( 5 ): 10 - 15 .
ZHANG J , TANG H Y , LIU W T , et al . Reference architecture of the telecom network security protection system for cloud network convergence [J ] . Telecommunications Science , 2020 , 36 ( 5 ): 10 - 15 .
方琰崴 . 5G核心网安全解决方案 [J ] . 移动通信 , 2019 , 43 ( 10 ): 19 - 25 .
FANG Y W . 5G core network security solution [J ] . Mobile Communications , 2019 , 43 ( 10 ): 19 - 25 .
王全 , 方琰崴 . 5G电信云网络安全解决方案 [J ] . 邮电设计技术 , 2018 , 513 ( 11 ): 63 - 68 .
WANG Q , FANG Y W . Security solution in 5G cloud core network [J ] . Designing Techniques of Posts and Telecommunications , 2018 , 513 ( 11 ): 63 - 68 .
HASNAT M A , RURNEE S T A , RAZZAQUE M A , et al . Security study of 5G heterogeneous network:current solutions,limitations & future direction [C ] // Proceedings of 2019 International Conference on Electrical,Computer and Communication Engineering (ECCE) .[S.l.:s.n. ] , 2019 .
SINGH K P , RISHIWAL V , KUMAR P . Classification of data to enhance data security in cloud computing [C ] // Proceedings of 2018 3rd International Conference On Internet of Things:Smart Innovation and Usages (IoT-SIU) .[S.l.:s.n. ] , 2018 .
AHMAD I , SHAHABUDDIN S , KUMAR T , et al . Security for 5G and beyond [J ] . IEEE Communications Surveys & Tutorials , 2019 , 21 ( 4 ): 3682 - 3722 .
冯登国 , 徐静 , 兰晓 . 5G 移动通信网络安全研究 [J ] . 软件学报 , 2018 , 29 ( 6 ): 1813 - 1825 .
FENG D G , XU J , LAN X . Study on 5G mobile communication network security [J ] . Journal of Software , 2018 , 29 ( 6 ): 1813 - 1825 .
ITU-T 805 . Securityarchitectureforsystemsprovidingend-to- end communications [S ] . 2003 .
3GPP . System architecture evolution (SAE); security architecture:TS33.501 V16.0.0 [S ] . 2019 .
3GPP . System architecture for the 5G system (5GS):TS23.501 V15.7.0 [S ] . 2019 .
3GPP . Procedures for the 5G system (5GS):TS23.502V16.2.0 [S ] . 2019 .
3GPP . NG general aspects and principles:TS38.410 V16.1.0 [S ] . 2020 .
3GPP . Technical specification radio access network; NG-RAN;NG layer 1:TS38.411 V15.0.0 [S ] . 2018 .
3GPP . NG-RAN; NG application protocol (NGAP):TS38.413 V16.1.0 [S ] . 2020 .
3GPP . Study on management and orchestration architecture of next generation networks and services:TR28.800 V15.0.0 [R ] . 2018 .
3GPP . Study on management and orchestration of network slicing for next generation network:TR28.801 V15.1.0 [R ] . 2018 .
3GPP . Study on management aspects of next generation network architecture and features:TR28.802 V15.0.0 [R ] . 2018 .
3GPP . Study on management aspects of edge computing:TR28.803 V16.0.1 [R ] . 2019 .
全国信息安全标准化技术委员会 . 信息安全技术 大数据安全管理指南:GB/T 37973-2019 [S ] . 2019 .
National Information Security Sandardization Technical Committee . Information security technology—big data security management guide:GB/T 37973-2019 [S ] . 2019 .
全国信息安全标准化技术委员会 . 数据安全能力成熟度模型:GB/T 37988-2019 [S ] . 2019 .
National Information Security Sandardization Technical Committee . Information security technology—data security capability maturity model:GB/T 37988-2019 [S ] . 2019 .
赵文 , 田永春 , 曾浩洋 . 5G安全架构分析 [J ] . 电讯技术 , 2020 , 60 ( 8 ): 876 - 882 .
ZHAO W , TIAN Y C , ZENG H Y . Analysis of 5G security architecture [J ] . Telecommunication Engineering , 2020 , 60 ( 8 ): 876 - 882 .
0
浏览量
346
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构