Graph database based security protection mechanism of 5G network data flow

As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combini...

Full description

Saved in:
Bibliographic Details
Main Authors: Li SU, Li LU, Xing ZHANG, Chang LIU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2021-04-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529080647778304
author Li SU
Li LU
Xing ZHANG
Chang LIU
author_facet Li SU
Li LU
Xing ZHANG
Chang LIU
author_sort Li SU
collection DOAJ
description As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data.
format Article
id doaj-art-3a4aabbdfb4049e6becc8f75bf04132e
institution Kabale University
issn 1000-0801
language zho
publishDate 2021-04-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-3a4aabbdfb4049e6becc8f75bf04132e2025-01-15T03:26:03ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012021-04-0137283659807480Graph database based security protection mechanism of 5G network data flowLi SULi LUXing ZHANGChang LIUAs the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/5G securitydata securitydata flowdata categorysecurity model
spellingShingle Li SU
Li LU
Xing ZHANG
Chang LIU
Graph database based security protection mechanism of 5G network data flow
Dianxin kexue
5G security
data security
data flow
data category
security model
title Graph database based security protection mechanism of 5G network data flow
title_full Graph database based security protection mechanism of 5G network data flow
title_fullStr Graph database based security protection mechanism of 5G network data flow
title_full_unstemmed Graph database based security protection mechanism of 5G network data flow
title_short Graph database based security protection mechanism of 5G network data flow
title_sort graph database based security protection mechanism of 5g network data flow
topic 5G security
data security
data flow
data category
security model
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/
work_keys_str_mv AT lisu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow
AT lilu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow
AT xingzhang graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow
AT changliu graphdatabasebasedsecurityprotectionmechanismof5gnetworkdataflow