Secure Cloud Architecture for 5G Core Network

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:sjhung888
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing to achieve extensibility, modularity, reusability, and openness. It also brings security problems (e.g., hypervisor hijacking, and malware injection). To provide secure 5G services, we propose a service-based cloud architecture called Mimicloud for 5GC based on dynamic and heterogeneous techniques. Mimicloud provides flexible reconfiguration mechanisms to protect containers and eliminate all attack knowledge obtained from adversaries. We use multiple containers to execute crucial services and ensure security with crosscheck. Mimicloud employs heterogeneous components to prevent multiple containers from being breached through the same vulnerabilities. Experimental results show that Mimicloud can effectively strengthen the security of the 5GC. The performance overhead is analyzed in order to demonstrate its scalability.
其他文献
A novel High-order extended Kalman Filter (HEKF) is designed for a class of complex dynamic systems with polynomial nonlinearities. The state and measurement mo
We proposes an improved grasshopper algorithm for global optimization problems. Grasshopper optimization algorithm (GOA) is a recently proposed meta-heuristic a
This paper presents the design and analysis of a distributed power amplifier with 6-dB bandwidth from 10MHz to 6GHz. To meet the stringent targeted specificatio
In a specific project, how to find a reasonable balance between a plurality of objectives and their optimal solutions has always been an important aspect for re
In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed.Identity (ID) based RDIC protocols are constructed to guar
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe
In this paper, we propose a fully automatic mesh segmentation method, which divides meshes into sub-meshes recursively through spectral analysis. A common problem in the spectral analysis of geometric
In this paper, based on a result of Lidl and Mullen (Mathematical Journal of Okayama University, 1991), the maximum length and the second maximum length that ca
An algorithm for output spectrum analysis of nonlinear system with correlative sources is proposed. First, the output terms of nonlinear system are analyzed bas
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag