Graph database based security protection mechanism of 5G network data flow
As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combini...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529080647778304 |
---|---|
author | Li SU Li LU Xing ZHANG Chang LIU |
author_facet | Li SU Li LU Xing ZHANG Chang LIU |
author_sort | Li SU |
collection | DOAJ |
description | As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data. |
format | Article |
id | doaj-art-3a4aabbdfb4049e6becc8f75bf04132e |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2021-04-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-3a4aabbdfb4049e6becc8f75bf04132e2025-01-15T03:26:03ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012021-04-0137283659807480Graph database based security protection mechanism of 5G network data flowLi SULi LUXing ZHANGChang LIUAs the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/5G securitydata securitydata flowdata categorysecurity model |
spellingShingle | Li SU Li LU Xing ZHANG Chang LIU Graph database based security protection mechanism of 5G network data flow Dianxin kexue 5G security data security data flow data category security model |
title | Graph database based security protection mechanism of 5G network data flow |
title_full | Graph database based security protection mechanism of 5G network data flow |
title_fullStr | Graph database based security protection mechanism of 5G network data flow |
title_full_unstemmed | Graph database based security protection mechanism of 5G network data flow |
title_short | Graph database based security protection mechanism of 5G network data flow |
title_sort | graph database based security protection mechanism of 5g network data flow |
topic | 5G security data security data flow data category security model |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/ |
work_keys_str_mv | AT lisu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow AT lilu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow AT xingzhang graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow AT changliu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow |