Skip to main content

2023 | OriginalPaper | Buchkapitel

Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business

verfasst von : Daohua Zhu, Yajuan Guo, Lei Wei, Yunxiao Sun, Wei Liu

Erschienen in: Big Data and Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

5G has become an important driving force for the digital transformation of the power industry. Especially today, with the increasing security risk of big data, the safe and available power 5G business plays an important role in improving power business innovation and user experience. This paper analyzes the demand level differences of different businesses for big data security in the application scenario of power 5G business, and establishes the SLA classification and classification model. On this basis, the power 5G business objective is divided into three processes: business perception, business execution and business SLA evaluation, which are assigned to the corresponding slices respectively. A power 5G slice perception collaborative optimization model is proposed and solved iteratively by multi-objective particle swarm optimization algorithm. Simulation experiments show that compared with the traditional 5G application mode, the proposed scheme can search and optimize the network resource allocation through the cooperation between slices, effectively schedule the slice resources and improve the operation efficiency and performance of power 5G service.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jain, S., Gupta, S., Sreelakshmi, K.K., et al.: Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. Clust. Comput. 25(2), 1111–1154 (2022)CrossRef Jain, S., Gupta, S., Sreelakshmi, K.K., et al.: Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. Clust. Comput. 25(2), 1111–1154 (2022)CrossRef
2.
Zurück zum Zitat Soleymani, S.A., Anisi, M.H., Abdullah, A.H., et al.: An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Science China Inf. Sci. 63(12), 220305 (2020)MathSciNetCrossRef Soleymani, S.A., Anisi, M.H., Abdullah, A.H., et al.: An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Science China Inf. Sci. 63(12), 220305 (2020)MathSciNetCrossRef
3.
Zurück zum Zitat Behrad, S., Bertin, E., Crespi, N.: A survey on authentication and access control for mobile networks: from 4G to 5G. Ann. Telecommun. 74(9), 593–603 (2019)CrossRef Behrad, S., Bertin, E., Crespi, N.: A survey on authentication and access control for mobile networks: from 4G to 5G. Ann. Telecommun. 74(9), 593–603 (2019)CrossRef
4.
Zurück zum Zitat Aggarwal, S., Kumar, N.: Fog computing for 5G-enabled tactile Internet: research issues, challenges, and future research directions. Mob. Netw. Appl. (2019) Aggarwal, S., Kumar, N.: Fog computing for 5G-enabled tactile Internet: research issues, challenges, and future research directions. Mob. Netw. Appl. (2019)
5.
Zurück zum Zitat Sankar, S.P., Subash, T.D., Vishwanath, N., et al.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and Internet of Things. Peer-to-Peer Network. Appl. 14(1), 392–402 (2021)CrossRef Sankar, S.P., Subash, T.D., Vishwanath, N., et al.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and Internet of Things. Peer-to-Peer Network. Appl. 14(1), 392–402 (2021)CrossRef
6.
Zurück zum Zitat Chu, Y., Pan, L., Leng, K., et al.: Research on key technologies of service quality optimizationfor industrial IoT 5G network for intelligent manufacturing. Int. J. Adv. Manuf. Technol. 107(3), 1071–1080 (2020)CrossRef Chu, Y., Pan, L., Leng, K., et al.: Research on key technologies of service quality optimizationfor industrial IoT 5G network for intelligent manufacturing. Int. J. Adv. Manuf. Technol. 107(3), 1071–1080 (2020)CrossRef
8.
Zurück zum Zitat Lindgren, P., Wuropulos, K.: Secure persuasive business models and business model innovation in a world of 5G. Wirel. Pers. Commun. 96(3), 3569–3583 (2017)CrossRef Lindgren, P., Wuropulos, K.: Secure persuasive business models and business model innovation in a world of 5G. Wirel. Pers. Commun. 96(3), 3569–3583 (2017)CrossRef
9.
Zurück zum Zitat Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Science China Inf. Sci. 61(8), 081301 (2018)CrossRef Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Science China Inf. Sci. 61(8), 081301 (2018)CrossRef
10.
Zurück zum Zitat Sharma, A., Jha, R.K.: A comprehensive survey on security issues in 5G wireless communication network using beamforming approach. Wirel. Pers. Commun. 119(4), 3447–3501 (2021)CrossRef Sharma, A., Jha, R.K.: A comprehensive survey on security issues in 5G wireless communication network using beamforming approach. Wirel. Pers. Commun. 119(4), 3447–3501 (2021)CrossRef
11.
Zurück zum Zitat Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385–431 (2021)CrossRef Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385–431 (2021)CrossRef
12.
Zurück zum Zitat Chochliouros, I.P., Spiliopoulou, A.S., Kostopoulos, A., et al.: Security threat analysis of the 5G ESSENCE platform. Wirel. Pers. Commun. 120(3), 2409–2426 (2021)CrossRef Chochliouros, I.P., Spiliopoulou, A.S., Kostopoulos, A., et al.: Security threat analysis of the 5G ESSENCE platform. Wirel. Pers. Commun. 120(3), 2409–2426 (2021)CrossRef
13.
Zurück zum Zitat Jorquera Valero, J.M., Sánchez Sánchez, P.M., Lekidis, A., et al.: Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 30(1), 7 (2021)CrossRef Jorquera Valero, J.M., Sánchez Sánchez, P.M., Lekidis, A., et al.: Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 30(1), 7 (2021)CrossRef
14.
Zurück zum Zitat AlQahtani, S.A., Alhomiqani, W.A.: A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommun. Syst. 73(2), 205–221 (2020)CrossRef AlQahtani, S.A., Alhomiqani, W.A.: A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommun. Syst. 73(2), 205–221 (2020)CrossRef
15.
Zurück zum Zitat Luo, M., Wu, J., Li, X.: Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommun. Syst. 74(4), 437–449 (2020)CrossRef Luo, M., Wu, J., Li, X.: Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommun. Syst. 74(4), 437–449 (2020)CrossRef
16.
Zurück zum Zitat Liu, T., Wu, F., Li, X., et al.: A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3), 317–329 (2021)CrossRef Liu, T., Wu, F., Li, X., et al.: A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3), 317–329 (2021)CrossRef
17.
Zurück zum Zitat De Dutta, S., Prasad, R.: Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 106(1), 261–273 (2019)CrossRef De Dutta, S., Prasad, R.: Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 106(1), 261–273 (2019)CrossRef
18.
Zurück zum Zitat Nayak Manjeshwar, A., Jha, P., Karandikar, A., et al.: VirtRAN: an SDN/NFV-based framework for 5G RAN slicing. J. Indian Inst. Sci. 100(2), 409–434 (2020)CrossRef Nayak Manjeshwar, A., Jha, P., Karandikar, A., et al.: VirtRAN: an SDN/NFV-based framework for 5G RAN slicing. J. Indian Inst. Sci. 100(2), 409–434 (2020)CrossRef
19.
Zurück zum Zitat Mumtaz, T., Muhammad, S., Aslam, M.I., et al.: Inter-slice resource management for 5G radio access network using markov decision process. Telecommun. Syst. 79(4), 541–557 (2022)CrossRef Mumtaz, T., Muhammad, S., Aslam, M.I., et al.: Inter-slice resource management for 5G radio access network using markov decision process. Telecommun. Syst. 79(4), 541–557 (2022)CrossRef
20.
Zurück zum Zitat Kotulski, Z., Nowak, T.W., Sepczuk, M., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)CrossRef Kotulski, Z., Nowak, T.W., Sepczuk, M., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)CrossRef
21.
Zurück zum Zitat AlQahtani, S.A., Altamrah, A.S.: Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique. Wireless Netw. 25(7), 3825–3838 (2019)CrossRef AlQahtani, S.A., Altamrah, A.S.: Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique. Wireless Netw. 25(7), 3825–3838 (2019)CrossRef
22.
Zurück zum Zitat Maman, M., Calvanese-Strinati, E., Dinh, L.N., et al.: Beyond private 5G networks: applications, architectures, operator models and technological enablers. EURASIP J. Wirel. Commun. Netw. 2021(1), 195 (2021)CrossRef Maman, M., Calvanese-Strinati, E., Dinh, L.N., et al.: Beyond private 5G networks: applications, architectures, operator models and technological enablers. EURASIP J. Wirel. Commun. Netw. 2021(1), 195 (2021)CrossRef
23.
Zurück zum Zitat Mathew, A.: Network slicing in 5G and the security concerns. In: Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), F 11–13 March 2020 (2020) Mathew, A.: Network slicing in 5G and the security concerns. In: Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), F 11–13 March 2020 (2020)
24.
Zurück zum Zitat Sattar, D., Matrawy, A.: Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), F 10–12 June 2019 (2019) Sattar, D., Matrawy, A.: Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), F 10–12 June 2019 (2019)
25.
Zurück zum Zitat Kapassa, E., Touloupou, M., Stavrianos, P., et al.: Dynamic 5G slices for IoT applications with diverse requirements. In: Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, F 15–18 October 2018 (2018) Kapassa, E., Touloupou, M., Stavrianos, P., et al.: Dynamic 5G slices for IoT applications with diverse requirements. In: Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, F 15–18 October 2018 (2018)
26.
Zurück zum Zitat Grønsund, P., Gonzalez, A., Mahmood, K., et al.: 5G service and slice implementation for a military use case. In: Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), F 7–11 June 2020 (2020) Grønsund, P., Gonzalez, A., Mahmood, K., et al.: 5G service and slice implementation for a military use case. In: Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), F 7–11 June 2020 (2020)
27.
Zurück zum Zitat Mahmood, K., Mahmoodi, T., Trivisonno, R., et al.: On the integration of verticals through 5G control plane. In: Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), F 12–15 June 2017 (2017) Mahmood, K., Mahmoodi, T., Trivisonno, R., et al.: On the integration of verticals through 5G control plane. In: Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), F 12–15 June 2017 (2017)
28.
Zurück zum Zitat Bega, D., Gramaglia, M., Banchs, A., et al.: Optimising 5G infrastructure markets: the business of network slicing. In: Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications, F (2017) Bega, D., Gramaglia, M., Banchs, A., et al.: Optimising 5G infrastructure markets: the business of network slicing. In: Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications, F (2017)
29.
Zurück zum Zitat Caballero, P., Banchs, A., Veciana, G.D., et al.: Network slicing games: enabling customization in multi-tenant mobile networks. IEEE/ACM Trans. Network. 27(2), 662–675 (2019)CrossRef Caballero, P., Banchs, A., Veciana, G.D., et al.: Network slicing games: enabling customization in multi-tenant mobile networks. IEEE/ACM Trans. Network. 27(2), 662–675 (2019)CrossRef
30.
Zurück zum Zitat Zhang, N., Liu, Y.F., Farmanbar, H., et al.: Network slicing for service-oriented networks under resource constraints. IEEE J. Sel. Areas Commun. 35(11), 2512–2521 (2017)CrossRef Zhang, N., Liu, Y.F., Farmanbar, H., et al.: Network slicing for service-oriented networks under resource constraints. IEEE J. Sel. Areas Commun. 35(11), 2512–2521 (2017)CrossRef
31.
Zurück zum Zitat Guan, W., Wen, X., Wang, L., et al.: A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 6(19), 691–701 (2018) Guan, W., Wen, X., Wang, L., et al.: A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 6(19), 691–701 (2018)
32.
Zurück zum Zitat Kotulski Z, Nowak T, Sepczuk M, et al.: On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), F 3–6 September 2017 (2017) Kotulski Z, Nowak T, Sepczuk M, et al.: On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), F 3–6 September 2017 (2017)
Metadaten
Titel
Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business
verfasst von
Daohua Zhu
Yajuan Guo
Lei Wei
Yunxiao Sun
Wei Liu
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3300-6_33

Premium Partner