Slicing the Network: Maintaining Neutrality, Protecting Privacy, and
Promoting Competition
- URL: http://arxiv.org/abs/2308.05829v1
- Date: Thu, 10 Aug 2023 19:13:07 GMT
- Title: Slicing the Network: Maintaining Neutrality, Protecting Privacy, and
Promoting Competition
- Authors: Nick Doty, Mallory Knodel
- Abstract summary: 5G mobile networks enable network operators to engage in a technique called network slicing.
The portion of a network that is sliced can be used to provide a suite of different service offerings.
Report describes the technologies used for network slicing and outlines recommendations for both operators and regulators.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The principles of net neutrality have been essential for maintaining the
diversity of services built on top of the internet and for maintaining some
competition between small and large providers of those online services. That
diversity and competition, in turn, provide users with a broader array of
choices for seeking online content and disseminating their own speech.
Furthermore, in order for the internet to be used to its full potential and to
protect the human rights of internet users, we need privacy from surveillance
and unwarranted data collection by governments, network providers, and edge
providers.
The transition to 5G mobile networks enables network operators to engage in a
technique called network slicing. The portion of a network that is sliced can
be used to provide a suite of different service offerings, each tailored to
specific purposes, instead of a single, general-purpose subscription for mobile
voice and data. This requires a careful approach. Our report describes the
technologies used for network slicing and outlines recommendations -- for both
operators and regulators -- to enable network slicing while maintaining network
neutrality, protecting privacy, and promoting competition.
Related papers
- Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator [9.866910244173761]
We propose a universally composable authentication and handover scheme with strong user privacy support.
Our proposed solution will most likely be deployed by the MVNO(s) to ensure enhanced privacy support to their customer(s)
arXiv Detail & Related papers (2024-09-07T18:04:54Z) - Differentially Private Data Release on Graphs: Inefficiencies and Unfairness [48.96399034594329]
This paper characterizes the impact of Differential Privacy on bias and unfairness in the context of releasing information about networks.
We consider a network release problem where the network structure is known to all, but the weights on edges must be released privately.
Our work provides theoretical foundations and empirical evidence into the bias and unfairness arising due to privacy in these networked decision problems.
arXiv Detail & Related papers (2024-08-08T08:37:37Z) - Consistent community detection in multi-layer networks with heterogeneous differential privacy [4.451479907610764]
We propose a personalized edge flipping mechanism that allows data publishers to protect edge information based on each node's privacy preference.
It can achieve differential privacy while preserving the community structure under the multi-layer degree-corrected block model.
We show that better privacy protection of edges can be obtained for a proportion of nodes while allowing other nodes to give up their privacy.
arXiv Detail & Related papers (2024-06-20T22:49:55Z) - Learning to Slice Wi-Fi Networks: A State-Augmented Primal-Dual Approach [79.00655335405195]
Network slicing is a key feature in 5G/NG cellular networks that creates customized slices for different service types with various quality-of-service (QoS) requirements.
In Wi-Fi networks, there is limited prior work on slicing, and a potential solution is based on a multi-tenant architecture on a single access point (AP) that dedicates different channels to different slices.
We show that state augmentation is crucial for generating slicing decisions that meet the ergodic requirements.
arXiv Detail & Related papers (2024-05-09T13:13:34Z) - Accelerating Tactile Internet with QUIC: A Security and Privacy Perspective [3.2738809491666077]
We envision a futuristic scenario where a QUIC-enabled network uses the underlying 6G communication infrastructure to achieve the requirements for Tactile Internet.
This article reviews the existing security and privacy attacks in QUIC and their implication on users.
arXiv Detail & Related papers (2024-01-12T16:05:13Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - Cross-Network Social User Embedding with Hybrid Differential Privacy
Guarantees [81.6471440778355]
We propose a Cross-network Social User Embedding framework, namely DP-CroSUE, to learn the comprehensive representations of users in a privacy-preserving way.
In particular, for each heterogeneous social network, we first introduce a hybrid differential privacy notion to capture the variation of privacy expectations for heterogeneous data types.
To further enhance user embeddings, a novel cross-network GCN embedding model is designed to transfer knowledge across networks through those aligned users.
arXiv Detail & Related papers (2022-09-04T06:22:37Z) - Large-Scale Privacy-Preserving Network Embedding against Private Link
Inference Attacks [12.434976161956401]
We address a novel problem of privacy-preserving network embedding against private link inference attacks.
We propose to perturb the original network by adding or removing links, and expect the embedding generated on the perturbed network can leak little information about private links but hold high utility for various downstream tasks.
arXiv Detail & Related papers (2022-05-28T13:59:39Z) - Machine Learning Based Network Coverage Guidance System [0.0]
With the advent of 4G, there has been a huge consumption of data and the availability of mobile networks has become paramount.
In this paper, we introduce a novel approach, to identify the regions that have poor network connectivity.
The solution enables customers to navigate to a better mobile network coverage area with stronger signal strength location.
arXiv Detail & Related papers (2020-10-25T19:01:16Z) - Wireless Power Control via Counterfactual Optimization of Graph Neural
Networks [124.89036526192268]
We consider the problem of downlink power control in wireless networks, consisting of multiple transmitter-receiver pairs communicating over a single shared wireless medium.
To mitigate the interference among concurrent transmissions, we leverage the network topology to create a graph neural network architecture.
We then use an unsupervised primal-dual counterfactual optimization approach to learn optimal power allocation decisions.
arXiv Detail & Related papers (2020-02-17T07:54:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.