L. Suárez, D. Espès, F. Cuppens, P. Bertin, Cao-Thanh Phan, P. L. Parc
{"title":"Formalization of a security access control model for the 5G system","authors":"L. Suárez, D. Espès, F. Cuppens, P. Bertin, Cao-Thanh Phan, P. L. Parc","doi":"10.1109/NoF50125.2020.9249137","DOIUrl":null,"url":null,"abstract":"The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to consider security access mechanisms and policy rules, to regulate how interconnections are made between the shared network functions and how to allow specific traffic. The existing models do not address all the needs inherent to the 5G architecture, such as multi-tenancy, multi-domain and multiple security levels. To solve this challenge, this paper defines a novel access control model for 5G, leveraging on the best characteristics of traditional access control models used in operating systems and cloud scenarios. The security properties in our model obey the functional requirements within the 5G system as well as towards the customers. The actions and type of traffic of the system can be specified and enforced via an access control policy. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features. To solve this challenge, this paper defines a novel access control model for 5G, leveraging on the best characteristics of traditional access control models used in operating systems and cloud scenarios. The security properties in our model obey the functional requirements within the 5G system as well as towards the customers. The actions and type of traffic of the system can be specified and enforced via an access control policy. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features.","PeriodicalId":405626,"journal":{"name":"2020 11th International Conference on Network of the Future (NoF)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th International Conference on Network of the Future (NoF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NoF50125.2020.9249137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to consider security access mechanisms and policy rules, to regulate how interconnections are made between the shared network functions and how to allow specific traffic. The existing models do not address all the needs inherent to the 5G architecture, such as multi-tenancy, multi-domain and multiple security levels. To solve this challenge, this paper defines a novel access control model for 5G, leveraging on the best characteristics of traditional access control models used in operating systems and cloud scenarios. The security properties in our model obey the functional requirements within the 5G system as well as towards the customers. The actions and type of traffic of the system can be specified and enforced via an access control policy. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features. To solve this challenge, this paper defines a novel access control model for 5G, leveraging on the best characteristics of traditional access control models used in operating systems and cloud scenarios. The security properties in our model obey the functional requirements within the 5G system as well as towards the customers. The actions and type of traffic of the system can be specified and enforced via an access control policy. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features. Besides addressing the 5G system, our innovation is general enough to be applied over other types of architectures, proving its scalability and capability to incorporate more security features.