通信学报 ›› 2021, Vol. 42 ›› Issue (1): 67-78.doi: 10.11959/j.issn.1000-436x.2021005

所属专题: 6G

• 学术论文 • 上一篇    下一篇

面向6G的雾无线接入网内生安全数据共享机制研究

刘杨1,2, 李珺1,2, 陈文韵1, 彭木根1,2   

  1. 1 北京邮电大学信息与通信工程学院,北京 100876
    2 北京邮电大学网络与交换技术国家重点实验室,北京 100876
  • 修回日期:2020-10-24 出版日期:2021-01-25 发布日期:2021-01-01
  • 作者简介:刘杨(1984- ),男,黑龙江哈尔滨人,北京邮电大学副教授、硕士生导师,主要研究方向为6G内生安全等。
    李珺(1999- ),女,湖南株洲人,北京邮电大学硕士生,主要研究方向为6G内生安全等。
    陈文韵(1996- ),女,上海人,北京邮电大学博士生,主要研究方向为6G内生安全等。
    彭木根(1978- ),男,江西吉安人,博士,北京邮电大学教授、博士生导师,主要研究方向为移动通信组网等。
  • 基金资助:
    国家自然科学基金资助项目(61972049);国家科技重大专项基金资助项目(2018ZX03001023)

Research on endogenous security data sharing mechanism of F-RAN for 6G

Yang LIU1,2, Jun LI1,2, Wenyun CHEN1, Mugen PENG1,2   

  1. 1 School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Revised:2020-10-24 Online:2021-01-25 Published:2021-01-01
  • Supported by:
    The National Natural Science Foundation of China(61972049);The National Science and Technology Major Project of China(2018ZX03001023)

摘要:

为解决6G移动通信系统中雾无线接入网中数据共享的数据安全问题,提出了一种实现本地差分隐私和动态批量审计的内生安全数据共享机制。首先,用户本地对数据运行 RAPPOR 算法保护数据隐私;其次,雾接入点对数据进行缓存和预处理;再次,大功率节点对雾接入点上的数据进行基于BLS签名和Merkle哈希树的数据完整性审计;最后,BBU池通过统计分析推断出共享数据的原始分布。安全性分析和仿真表明,所提机制实现了用户的本地差分隐私,并支持安全的多客户端批量审计和数据动态操作,同时具有较高的时间、空间和通信效率。

关键词: 数据共享, 雾无线接入网, 内生安全, 本地化差分隐私, 数据完整性审计

Abstract:

In order to solve the data security problem of data sharing in the fog radio access network in the 6G mobile communication system, an endogenous secure data sharing mechanism that realized local differential privacy and dynamic batch auditing was proposed.First, the user ran the RAPPOR algorithm locally on the data to protect data privacy.Next, the fog access point cached and preprocessed the data.Then the high power node performed a data integrity audit based on the BLS signature and Merkle hash tree on the data cached on the fog access point.Finally, the BBU pool infered the original distribution of shared data through statistical analysis.Security analysis and simulation show that the proposed mechanism realizes the local differential privacy of users, supports secure multi-client batch audit and data dynamic operation, and has high efficiency in time, space and communication.

Key words: data sharing, F-RAN, endogenous security, local differential privacy, data integrity auditing

中图分类号: 

No Suggested Reading articles found!