2015 IEEE 81st Vehicular Technology Conference (VTC Spring) 2015
DOI: 10.1109/vtcspring.2015.7145587
|View full text |Cite
|
Sign up to set email alerts
|

5G Visions of User Privacy

Abstract: Currently the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed for the future 5G networks. The paper concludes that an ecosystem consisting of a Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Anyhow, 5G versatile directors are dropping the entire control of the frameworks as they will depend upon new on-screen characters such communications provider carriers. On this way, 5G directors will lose the full management of safety and safety [26]. Customer and information protection are clearly tested in shared conditions wherein a similar foundation is shared among distinct on-screen characters, for instance virtual mobile networks operators (VMNOs) and one-of-akind contenders.…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…Anyhow, 5G versatile directors are dropping the entire control of the frameworks as they will depend upon new on-screen characters such communications provider carriers. On this way, 5G directors will lose the full management of safety and safety [26]. Customer and information protection are clearly tested in shared conditions wherein a similar foundation is shared among distinct on-screen characters, for instance virtual mobile networks operators (VMNOs) and one-of-akind contenders.…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…However, 5G mobile operators are losing the full control of the systems as they will rely on new actors such CSPs. Thus, 5G operators will lose the full governance of security and privacy [29]. User and data privacy are seriously challenged in shared environments where the same infrastructure is shared among various actors, for instance VMNOs and other competitors.…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…5G will require better mechanisms for accountability, data minimization, transparency, openness and access control [25]. Hence during the standardization of 5G, strong privacy regulations and legislation should be taken into account [29]. The regulatory approach can be classified into three types [62].…”
Section: Security Solutions For Privacy In 5gmentioning
confidence: 99%
“…However, the privacy awareness is significantly increasing among the users. In present day, most of the mobile phone users are concerned and informed about their privacy [9]. They are not downloading mobile applications which they do not trust.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, many mobile users are still not hesitating to store their personal information on mobile phones due to easy accessibility. As a result, future mobile phones will have more personal information which must be protected [9]. Therefore, 5G networks need to provide an extra level of security compared to the earlier generation of networks.…”
Section: Introductionmentioning
confidence: 99%