SH-CRAN: Hierarchical framework to support mobile big data computing in a secure manner

Qiang Liu*, Edith C.H. Ngai, Xiping Hu, Zhengguo Sheng, Victor C.M. Leung, Jianping Yin

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

3 引用 (Scopus)

摘要

The heterogeneous cloud radio access network (H-CRAN) has been emerging as a cost-effective solution supporting huge volumes of mobile traffic in the big data era. This paper investigates potential security challenges on H-CRAN and analyzes their likelihoods and difficulty levels. Typically, the security threats in H-CRAN can be categorized into three groups, i.e., security threats towards remote radio heads (RRHs), those towards the radio cloud infrastructure and towards backhaul networks. To overcome challenges made by the security threats, we propose a hierarchical security framework called Secure H-CRAN (SH-CRAN) to protect the H-CRAN system against the potential threats. Specifically, the architecture of SH-CRAN contains three logically independent secure domains (SDs), which are the SDs of radio cloud infrastructure, RRHs and backhauls. The notable merits of SH-CRAN include two aspects: (i) the proposed framework is able to provide security assurance for the evolving H-CRAN system, and (ii) the impacts of any failure are limited in one specific component of H-CRAN. The proposed SH-CRAN can be regarded as the basis of the future security mechanisms of mobile bag data computing.

源语言英语
主期刊名Mobidata’15 - Proceedings of the 2015 Workshop on Mobile Big Data, co-located with MobiHoc 2015
19-24
页数6
ISBN(电子版)9781450334891, 9781450335140, 9781450335171, 9781450335188, 9781450335232, 9781450335249, 9781450335256
DOI
出版状态已出版 - 22 6月 2015
已对外发布
活动ACM Workshop on Mobile Big Data, Mobidata 2015 - Hangzhou, 中国
期限: 21 6月 2015 → …

出版系列

姓名Mobidata 2015 - Proceedings of the 2015 Workshop on Mobile Big Data, co-located with MobiHoc 2015
2015-June

会议

会议ACM Workshop on Mobile Big Data, Mobidata 2015
国家/地区中国
Hangzhou
时期21/06/15 → …

指纹

探究 'SH-CRAN: Hierarchical framework to support mobile big data computing in a secure manner' 的科研主题。它们共同构成独一无二的指纹。

引用此