Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.7.001

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G  

Kim, Kyoum-Sun (Department of Mathematics, Chungbuk National University)
Yon, Yong-Ho (College of Liberal Education, Mokwon University)
Jeong, Yoon-Su (Division of Information and Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.7, 2019 , pp. 1-7 More about this Journal
Abstract
With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.
Keywords
5G; Privacy; Multiple links; Information processing; Personal information collection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Agiwal, A. Roy & N. Saxena. (2016). Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Communications Surveys Tutorials, 18(3), 1617-1655.   DOI
2 N. Alliance. (2015). NGMN 5G white paper. Next Generation Mobile Networks, White paper.
3 Z. Yan, P. Zhang & A. V. Vasilakos. (2016). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks, 9(16), 3059-3069.   DOI
4 L. T. Sorensen, S. Khajuria & K. E. Skouby. (2015). 2015 IEEE 81st Vehicular Technology Conference(VTC Spring), 1-4.
5 F. Kemmer, C. Reich, M. Knahl & N. Clarke. (2016). Software defined privacy. 2016 IEEE International conference on Cloud Engineering Workshop(IC2EW), 25-29.
6 D. J. Kim, Y. J. Jung & H. Y. Lee. (2018). Trends and Prospects for 5G Standardization. 2018, TTA Special Report, 1-8. http://www.tta.or.kr/data/reportDown.jsp?news_num=5347
7 X. Cui, P. Zhu, X. Yang, K. Li & C. Ji. (2014). Optimized big data K-means clustering using MapReduce. Journal of Supercomputing, 70(3), 1249-1259.   DOI
8 B. Bahmani, B. Moseley, A. Vattani, R. Kumar & S. Vassivitskii. (2012). Scalable k-means++. Proceedings of the VLDB Endowment, 5(7), 622-633.   DOI
9 X. Cui, J. S. Charles & T. Potok. (2013). GPU enhanced parallel computing for large scale data clustering. Journal of Future Generation Computer Systems, 29(7), 1736-1741.   DOI
10 Y. H. Kim, K S. Shim, M. S. Kim & J. S. Lee. (2014). DBCURE-MR: an efficient density-based clustering algorithm for large data using MapReduce. Journal of Information Systems, 42, 15-35.
11 J. Cao, M. Ma, Y. Fu, H. Li & Y. Zhang. (2019). CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets. IEEE Transactions on Dependable and Secure Computing, 1-1.
12 Y. Deng, L. Wang, K. K. Wong, A. Nallanathan, M. Elkashlan & S. Lambotharan. (2015). Safeguarding massive MIMO aided hetnets using physical layer security. Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing(pp. 1-5).
13 S. Sheikhzadeh. M. R. Javan & N. Mokari. (2017). Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary. Proceedings of the 2017 Iran Workshop on Communication and Information Theory (IWCIT)(pp. 1-6).
14 X. Duan & X. Wang. (2016). Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. Proceedings of the 2016 IEEE International Conference on Communications (ICC) (pp. 1-6).
15 T. Ma, F. Hu & M. Ma. (2017). Fast and efficient physical layer authentication for 5G HetNet handover. Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC)(pp. 1-3).