Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications

被引:2
作者
Wang, Xiangyu [1 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2025年 / 30卷 / 01期
基金
中国国家自然科学基金;
关键词
Security; Collaboration; Information services; Cloud computing; Semantics; Data communication; Wireless networks; wireless network security; information services security; secure semantic communication model; cloud-network-end collaborative security architecture; heterogeneous network secure convergence; AUTHENTICATION SCHEME; ANONYMITY; PROTOCOL; ALGORITHMS; DATABASE;
D O I
10.26599/TST.2023.9010158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The core goal of network security is to protect the security of data sharing. Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security. However, with the advancement of mobile networks, cloud computing, and Internet of Things, communication-computing integration and cloud-network integration have been important technical routes. As a result, the main application requirements of wireless networks have changed from data transmission to cloud-based information services. Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era, and secure semantic communication has become an important model. To address this issue, we propose a cloud-network-end collaborative security architecture. Firstly, we clarify security mechanisms for end system security, network connection security, and cloud services security, respectively. Next, based on the above three aspects, we elaborate on the connotation of cloud-network-end collaborative security. By giving example applications, including heterogeneous network secure convergence framework, unmanned system collaborative operations security framework, and space-air-ground integrated network security framework, we demonstrate the universality of the proposed architecture. Finally, we review the current research on end system security, network connection security, and cloud services security, respectively.
引用
收藏
页码:18 / 33
页数:16
相关论文
共 92 条
[41]   Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings [J].
Li, Yingying ;
Ma, Jianfeng ;
Miao, Yinbin ;
Wang, Yue ;
Yang, Tengfei ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) :2936-2948
[42]   General composition and universal composability in secure multi-party computation [J].
Lindell, Y .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :394-403
[43]  
Lindell Y., 2003, Composition of Secure Multi -Party Protocols: A Comprehensive Study
[44]   Space-Air-Ground Integrated Network: A Survey [J].
Liu, Jiajia ;
Shi, Yongpeng ;
Fadlullah, Zubair Md. ;
Kato, Nei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :2714-2741
[45]   Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks [J].
Liu, Jingwei ;
Zhang, Zonghua ;
Chen, Xiaofeng ;
Kwak, Kyung Sup .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :332-342
[46]   A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains [J].
Liu, Ximeng ;
Qin, Baodong ;
Deng, Robert H. ;
Lu, Rongxing ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) :3567-3579
[47]   Privacy-Preserving Object Detection for Medical Images With Faster R-CNN [J].
Liu, Yang ;
Ma, Zhuo ;
Liu, Ximeng ;
Ma, Siqi ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :69-84
[48]   RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning [J].
Liu, Yang ;
Ma, Zhuo ;
Yang, Yilong ;
Liu, Ximeng ;
Ma, Jianfeng ;
Ren, Kui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) :3671-3685
[49]   Smaug: A TEE-Assisted Secured SQLite for Embedded Systems [J].
Lu, Di ;
Shi, Minqiang ;
Ma, Xindi ;
Liu, Ximeng ;
Guo, Rui ;
Zheng, Tianfang ;
Shen, Yulong ;
Dong, Xuewen ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) :3617-3635
[50]   xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices [J].
Lu, Di ;
Han, Ruidong ;
Shen, Yulong ;
Dong, Xuewen ;
Ma, Jianfeng ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (02) :370-383