ZTE Communications ›› 2026, Vol. 24 ›› Issue (1): 45-55.DOI: 10.12142/ZTECOM.202601007

• Special Topic • Previous Articles     Next Articles

Efficient and Secure Data Storage in 5G Industrial Internet Collaborative Systems

Wang Jigang1,2(), Liu Dong1,2, Wan Changsheng3, Lu Ping1,2   

  1. 1.State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen 518055, China
    2.ZTE Corporation, Shenzhen 518057, China
    3.Southeast University, Nanjing 210096, China
  • Received:2024-06-26 Online:2026-03-25 Published:2026-03-17
  • About author:Wang Jigang (wang.jigang@zte.com.cn) is General Manager of the Cybersecurity Product Line at ZTE Corporation. His research interests include operating systems, cybersecurity, and cloud computing. Dr. Wang has participated in and supported a number of national key science and technology projects and national science and technology support programs, and has published multiple academic papers.
    Liu Dong is Deputy Director of the Central Research Institute at ZTE Corporation. His research interests include operating systems, cybersecurity, and cloud computing. He has participated in and supported a number of national key science and technology projects and national science and technology support programs, and has published multiple academic papers.
    Wan Changsheng received his BS degree in applied physics and PhD degree in physical electronics from University of Science and Technology of China in 1999 and 2004, respectively. Since June 2009, he has been with Southeast University, where he is currently a professor with the School of Cyber Science and Engineering. His research interests include network security, wireless communication, and data mining.
    Lu Ping is the Vice President and Director of the R&D Project in the Technology Planning Department at ZTE Corporation. He also serves as the Executive Deputy Director of the National Key Laboratory of Mobile Network and Mobile Multimedia Technology. His research directions include cloud computing, big data, augmented reality, and multimedia service-based technologies.
  • Supported by:
    ZTE Industry?University?Institute Cooperation Funds(IA20230628015);the State Key Laboratory of Particle Detection and Electronics(SKLPDE?KF?202314)

Abstract:

Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges. The characteristics of 5G networks, such as low latency and high speed, facilitate data transmission in the industrial Internet but also increase vulnerability to attacks like theft and tampering. Moreover, in 5G industrial Internet collaborative system environments, data flows across multiple entities and links, which necessitates a flexible access control model to meet specific data access requirements. Traditional role-based and attribute-based access control mechanisms are difficult to apply in such dynamic application scenarios. To address these challenges, we propose a novel data storage solution for 5G industrial Internet collaborative systems. Similar to existing approaches, it provides integrity and confidentiality protection for transmitted data. In terms of security, only authenticated data owners and users can obtain file decryption keys, preventing malicious attackers from data forgery. Regarding access control, decryption is permitted only to authorized data users, safeguarding against unauthorized file access. Furthermore, by introducing an attribute-based encryption mechanism, only data users with specific attributes can decrypt files. In terms of efficiency, our approach utilizes bilinear and modular exponentiation operations solely during the authentication process. For handling substantial data loads, lightweight cryptographic algorithms are employed. Consequently, our solution achieves higher efficiency compared with other known methods. Experimental results demonstrate the feasibility of our approach in real-world applications.

Key words: 5G industrial Internet collaborative systems, data storage, identity-based authentication, access control