Research on endogenous security data sharing mechanism of F-RAN for 6G

被引:0
|
作者
Liu Y. [1 ,2 ]
Li J. [1 ,2 ]
Chen W. [1 ]
Peng M. [1 ,2 ]
机构
[1] School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing
[2] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing
来源
| 1600年 / Editorial Board of Journal on Communications卷 / 42期
基金
中国国家自然科学基金;
关键词
Data integrity auditing; Data sharing; Endogenous security; F-RAN; Local differential privacy;
D O I
10.11959/j.issn.1000-436x.2021005
中图分类号
学科分类号
摘要
In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was proposed. First, the user ran the RAPPOR algorithm locally on the data to protect data privacy. Next, the fog access point cached and preprocessed the data. Then the high power node performed a data integrity audit based on the BLS signature and Merkle hash tree on the data cached on the fog access point. Finally, the BBU pool infered the original distribution of shared data through statistical analysis. Security analysis and simulation show that the proposed mechanism realizes the local differential privacy of users, supports secure multi-client batch audit and data dynamic operation, and has high efficiency in time, space and communication. © 2021, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:67 / 78
页数:11
相关论文
共 20 条
  • [1] ZHAO Y J, YU G H, XU H Q., 6G mobile communication networks: vision, challenges, and key technologies, Scientia Sinica(Informationis), 49, 8, pp. 963-987, (2019)
  • [2] ZHANG P, NIU K, TIAN H, Et al., Technology prospect of 6G mobile communications, Journal on Communications, 40, 1, pp. 141-148, (2019)
  • [3] YIN B N, AI Y, PENG M G., Fog computing based radio access networks: architecture, principles and challenges, Telecommunications Science, 32, 6, pp. 20-27, (2016)
  • [4] PENG M, ZHANG K., Recent advances in fog radio access networks: performance analysis and radio resource allocation, IEEE Access, 4, pp. 5003-5009, (2016)
  • [5] LIU D, YANG J, TAN Y J., A survey on the storage issues in edge computing, ZTE Technology Journal, 25, 3, pp. 15-22, (2019)
  • [6] WANG B, LI B, LI H., Oruta: privacy-preserving public auditing for shared data in the cloud, IEEE Transactions on Cloud Computing, 2, 1, pp. 43-56, (2014)
  • [7] TANG C M, ZHENG X L., A priva-cy-preserving public auditing mechanism for the date with large groups users in the cloud computing, Netinfo Security, 2, pp. 19-25, (2015)
  • [8] TRUEMAN T E, NARAYANASAMY P., Ensuring privacy and data freshness for public auditing of shared data in cloud, IEEE International Conference on Cloud Computing in Emerging Markets, pp. 22-27, (2016)
  • [9] LI J, ZHANG L, LIU J K, Et al., Privacy-preserving public auditing protocol for low-performance end devices in cloud, IEEE Transactions on Information Forensics & Security, 11, 11, pp. 2572-2583, (2016)
  • [10] SHEN W, QIN J, YU J, Et al., Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage, IEEE Transactions on Information Forensics and Security, 14, 2, pp. 331-346, (2018)