2021
DOI: 10.1109/mnet.011.2000666
|View full text |Cite
|
Sign up to set email alerts
|

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…For example, vehicle-to-vehicle data exchange and data analytics can enrich existing vehicle services in vehicular networks [257]. However, RoadSide Units (RSUs) and vehicles can be malicious and untrusted [258]. To solve this problem, the authors in [259] propose a consortium blockchain-based system pro-tected by smart contracts for secure data storage and exchange in vehicular networks.…”
Section: B Decentralized Edge Data Storage and Sharingmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, vehicle-to-vehicle data exchange and data analytics can enrich existing vehicle services in vehicular networks [257]. However, RoadSide Units (RSUs) and vehicles can be malicious and untrusted [258]. To solve this problem, the authors in [259] propose a consortium blockchain-based system pro-tected by smart contracts for secure data storage and exchange in vehicular networks.…”
Section: B Decentralized Edge Data Storage and Sharingmentioning
confidence: 99%
“…1) Blockchain in Edge Multimedia Networks: Multimodal multimedia services require a large amount of user privacy data to optimize the quality of service and immerse users in the Metaverse. Therefore, blockchain as a distributed ledger can record private information, such as preferred FoV, for Metaverse users [258]. Using fog-based access points as logging nodes of the blockchain, the authors in [282] propose blockchain-enabled fog radio access networks to provide decentralized logging services for VR services.…”
Section: Blockchain In Edge Resource Managementmentioning
confidence: 99%
“…The trustworthy communication network has become a key requirement in 6G as a result of growing privacy and security concerns [16], [37]. However, with the evolution of the network architecture from centralized control to distributed processing and the indepth convergence of AI technique, big data technique, 6G network foresees a huge exchange of data, which clearly poses some new challenges in terms of security, privacy, Fig.…”
Section: ) Trustworthiness-native Networkmentioning
confidence: 99%
“…For example, user trajectory and association history at different access points can be utilized to conduct AI-based network traffic prediction and content catching on the edge for dynamic network resource allocation [1,5]. Thus, how to effectively and efficiently manage user data-that is, DM, which includes multiple data operations in the life-cycle of user data, from data creation to deletion [6,7]-has become a key enabler of future network intelligence. However, the highly dynamic and heterogeneous nature of 6G imposes four major requirements on DM:…”
Section: Data Management (Dm) Toward 6gmentioning
confidence: 99%