Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Efficient and Secure Data Storage in 5G Industrial Internet Collaborative Systems
Wang Jigang, Liu Dong, Wan Changsheng, Lu Ping
ZTE Communications    2026, 24 (1): 45-55.   DOI: 10.12142/ZTECOM.202601007
Abstract2)   HTML0)    PDF (656KB)(0)       Save

Security and access control for data storage in 5G industrial Internet collaborative systems are facing significant challenges. The characteristics of 5G networks, such as low latency and high speed, facilitate data transmission in the industrial Internet but also increase vulnerability to attacks like theft and tampering. Moreover, in 5G industrial Internet collaborative system environments, data flows across multiple entities and links, which necessitates a flexible access control model to meet specific data access requirements. Traditional role-based and attribute-based access control mechanisms are difficult to apply in such dynamic application scenarios. To address these challenges, we propose a novel data storage solution for 5G industrial Internet collaborative systems. Similar to existing approaches, it provides integrity and confidentiality protection for transmitted data. In terms of security, only authenticated data owners and users can obtain file decryption keys, preventing malicious attackers from data forgery. Regarding access control, decryption is permitted only to authorized data users, safeguarding against unauthorized file access. Furthermore, by introducing an attribute-based encryption mechanism, only data users with specific attributes can decrypt files. In terms of efficiency, our approach utilizes bilinear and modular exponentiation operations solely during the authentication process. For handling substantial data loads, lightweight cryptographic algorithms are employed. Consequently, our solution achieves higher efficiency compared with other known methods. Experimental results demonstrate the feasibility of our approach in real-world applications.

Table and Figures | Reference | Related Articles | Metrics
Secure SSL/TLS Communication System Based on Quantum Keys
WANG Jigang, LU Yuqian, WEI Liping, JIANG Xinzao, ZHANG Han
ZTE Communications    2024, 22 (3): 106-115.   DOI: 10.12142/ZTECOM.202403013
Abstract238)   HTML11)    PDF (838KB)(290)       Save

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols facilitates a secure framework for identity authentication, data encryption, and message integrity verification. However, with the recent development in quantum computing technology, the security of conventional key-based SSL/TLS protocols faces vulnerabilities. In this paper, we propose a scheme by integrating the quantum key into the SSL/TLS framework. Furthermore, the application of post-quantum algorithms is used to enhance and complement the existing encryption suites. Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput. Moreover, the proposed system showcases good resilience against quantum attacks.

Table and Figures | Reference | Related Articles | Metrics
Optimization of High-Concurrency Conflict Issues in Execute-Order-Validate Blockchain
MA Qianli, ZHANG Shengli, WANG Taotao, YANG Qing, WANG Jigang
ZTE Communications    2024, 22 (2): 19-29.   DOI: 10.12142/ZTECOM.202402004
Abstract298)   HTML7)    PDF (1237KB)(185)       Save

With the maturation and advancement of blockchain technology, a novel execute-order-validate (EOV) architecture has been proposed, allowing transactions to be executed in parallel during the execution phase. However, parallel execution may lead to multi-version concurrency control (MVCC) conflicts during the validation phase, resulting in transaction invalidation. Based on different causes, we categorize conflicts in the EOV blockchain into two types: within-block conflicts and cross-block conflicts, and propose an optimization solution called FabricMan based on Fabric v2.4. For within-block conflicts, a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph. We also merge transfer transactions to prevent triggering multiple version checks. For cross-block conflicts, a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance. Experimental comparisons are conducted between FabricMan and two other systems, Fabric and Fabric++. The results show that FabricMan outperforms the other two systems in terms of throughput, transaction abort rate, algorithm execution time, and other experimental metrics.

Table and Figures | Reference | Related Articles | Metrics