{"title":"边缘计算中的安全网络切片部署","authors":"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao","doi":"10.1109/iccc52777.2021.9580199","DOIUrl":null,"url":null,"abstract":"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure network slicing deployment in edge computing\",\"authors\":\"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao\",\"doi\":\"10.1109/iccc52777.2021.9580199\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.\",\"PeriodicalId\":425118,\"journal\":{\"name\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC)\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccc52777.2021.9580199\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccc52777.2021.9580199","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure network slicing deployment in edge computing
As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.