Skip to main content

Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1796))

Included in the following conference series:

  • 340 Accesses

Abstract

5G has become an important driving force for the digital transformation of the power industry. Especially today, with the increasing security risk of big data, the safe and available power 5G business plays an important role in improving power business innovation and user experience. This paper analyzes the demand level differences of different businesses for big data security in the application scenario of power 5G business, and establishes the SLA classification and classification model. On this basis, the power 5G business objective is divided into three processes: business perception, business execution and business SLA evaluation, which are assigned to the corresponding slices respectively. A power 5G slice perception collaborative optimization model is proposed and solved iteratively by multi-objective particle swarm optimization algorithm. Simulation experiments show that compared with the traditional 5G application mode, the proposed scheme can search and optimize the network resource allocation through the cooperation between slices, effectively schedule the slice resources and improve the operation efficiency and performance of power 5G service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, S., Gupta, S., Sreelakshmi, K.K., et al.: Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. Clust. Comput. 25(2), 1111–1154 (2022)

    Article  Google Scholar 

  2. Soleymani, S.A., Anisi, M.H., Abdullah, A.H., et al.: An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Science China Inf. Sci. 63(12), 220305 (2020)

    Article  MathSciNet  Google Scholar 

  3. Behrad, S., Bertin, E., Crespi, N.: A survey on authentication and access control for mobile networks: from 4G to 5G. Ann. Telecommun. 74(9), 593–603 (2019)

    Article  Google Scholar 

  4. Aggarwal, S., Kumar, N.: Fog computing for 5G-enabled tactile Internet: research issues, challenges, and future research directions. Mob. Netw. Appl. (2019)

    Google Scholar 

  5. Sankar, S.P., Subash, T.D., Vishwanath, N., et al.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and Internet of Things. Peer-to-Peer Network. Appl. 14(1), 392–402 (2021)

    Article  Google Scholar 

  6. Chu, Y., Pan, L., Leng, K., et al.: Research on key technologies of service quality optimizationfor industrial IoT 5G network for intelligent manufacturing. Int. J. Adv. Manuf. Technol. 107(3), 1071–1080 (2020)

    Article  Google Scholar 

  7. Benslimen, Y., Sedjelmaci, H., Manenti, A.-C.: Attacks and failures prediction framework for a collaborative 5G mobile network. Computing 103(6), 1165–1181 (2021). https://doi.org/10.1007/s00607-020-00893-8

    Article  Google Scholar 

  8. Lindgren, P., Wuropulos, K.: Secure persuasive business models and business model innovation in a world of 5G. Wirel. Pers. Commun. 96(3), 3569–3583 (2017)

    Article  Google Scholar 

  9. Ji, X., Huang, K., Jin, L., et al.: Overview of 5G security technology. Science China Inf. Sci. 61(8), 081301 (2018)

    Article  Google Scholar 

  10. Sharma, A., Jha, R.K.: A comprehensive survey on security issues in 5G wireless communication network using beamforming approach. Wirel. Pers. Commun. 119(4), 3447–3501 (2021)

    Article  Google Scholar 

  11. Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385–431 (2021)

    Article  Google Scholar 

  12. Chochliouros, I.P., Spiliopoulou, A.S., Kostopoulos, A., et al.: Security threat analysis of the 5G ESSENCE platform. Wirel. Pers. Commun. 120(3), 2409–2426 (2021)

    Article  Google Scholar 

  13. Jorquera Valero, J.M., Sánchez Sánchez, P.M., Lekidis, A., et al.: Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 30(1), 7 (2021)

    Article  Google Scholar 

  14. AlQahtani, S.A., Alhomiqani, W.A.: A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommun. Syst. 73(2), 205–221 (2020)

    Article  Google Scholar 

  15. Luo, M., Wu, J., Li, X.: Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings. Telecommun. Syst. 74(4), 437–449 (2020)

    Article  Google Scholar 

  16. Liu, T., Wu, F., Li, X., et al.: A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3), 317–329 (2021)

    Article  Google Scholar 

  17. De Dutta, S., Prasad, R.: Security for smart grid in 5G and beyond networks. Wirel. Pers. Commun. 106(1), 261–273 (2019)

    Article  Google Scholar 

  18. Nayak Manjeshwar, A., Jha, P., Karandikar, A., et al.: VirtRAN: an SDN/NFV-based framework for 5G RAN slicing. J. Indian Inst. Sci. 100(2), 409–434 (2020)

    Article  Google Scholar 

  19. Mumtaz, T., Muhammad, S., Aslam, M.I., et al.: Inter-slice resource management for 5G radio access network using markov decision process. Telecommun. Syst. 79(4), 541–557 (2022)

    Article  Google Scholar 

  20. Kotulski, Z., Nowak, T.W., Sepczuk, M., et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)

    Article  Google Scholar 

  21. AlQahtani, S.A., Altamrah, A.S.: Supporting QoS requirements provisions on 5G network slices using an efficient priority-based polling technique. Wireless Netw. 25(7), 3825–3838 (2019)

    Article  Google Scholar 

  22. Maman, M., Calvanese-Strinati, E., Dinh, L.N., et al.: Beyond private 5G networks: applications, architectures, operator models and technological enablers. EURASIP J. Wirel. Commun. Netw. 2021(1), 195 (2021)

    Article  Google Scholar 

  23. Mathew, A.: Network slicing in 5G and the security concerns. In: Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), F 11–13 March 2020 (2020)

    Google Scholar 

  24. Sattar, D., Matrawy, A.: Towards secure slicing: using slice isolation to mitigate DDoS attacks on 5G core network slices. In: Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), F 10–12 June 2019 (2019)

    Google Scholar 

  25. Kapassa, E., Touloupou, M., Stavrianos, P., et al.: Dynamic 5G slices for IoT applications with diverse requirements. In: Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, F 15–18 October 2018 (2018)

    Google Scholar 

  26. Grønsund, P., Gonzalez, A., Mahmood, K., et al.: 5G service and slice implementation for a military use case. In: Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), F 7–11 June 2020 (2020)

    Google Scholar 

  27. Mahmood, K., Mahmoodi, T., Trivisonno, R., et al.: On the integration of verticals through 5G control plane. In: Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), F 12–15 June 2017 (2017)

    Google Scholar 

  28. Bega, D., Gramaglia, M., Banchs, A., et al.: Optimising 5G infrastructure markets: the business of network slicing. In: Proceedings of the IEEE Infocom-IEEE Conference on Computer Communications, F (2017)

    Google Scholar 

  29. Caballero, P., Banchs, A., Veciana, G.D., et al.: Network slicing games: enabling customization in multi-tenant mobile networks. IEEE/ACM Trans. Network. 27(2), 662–675 (2019)

    Article  Google Scholar 

  30. Zhang, N., Liu, Y.F., Farmanbar, H., et al.: Network slicing for service-oriented networks under resource constraints. IEEE J. Sel. Areas Commun. 35(11), 2512–2521 (2017)

    Article  Google Scholar 

  31. Guan, W., Wen, X., Wang, L., et al.: A service-oriented deployment policy of end-to-end network slicing based on complex network theory. IEEE Access 6(19), 691–701 (2018)

    Google Scholar 

  32. Kotulski Z, Nowak T, Sepczuk M, et al.: On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), F 3–6 September 2017 (2017)

    Google Scholar 

Download references

Acknowledgement

This publication is supported by the science and technology project of State Grid Jiangsu Electric Power Co., Ltd. (Project No.: J2021125).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daohua Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, D., Guo, Y., Wei, L., Sun, Y., Liu, W. (2023). Multi Slice SLA Collaboration and Optimization of Power 5G Big Data Security Business. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3300-6_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3299-3

  • Online ISBN: 978-981-99-3300-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics