Telecommunications Science ›› 2021, Vol. 37 ›› Issue (4): 28-36.doi: 10.11959/j.issn.1000-0801.2021058

• Research and Development • Previous Articles     Next Articles

Graph database based security protection mechanism of 5G network data flow

Li SU, Li LU, Xing ZHANG, Chang LIU   

  1. China Mobile Research Institute, Beijing 100032, China
  • Revised:2021-04-03 Online:2021-04-20 Published:2021-04-01

Abstract:

As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data.

Key words: 5G security, data security, data flow, data category, security model

CLC Number: 

No Suggested Reading articles found!