Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.784
Study on Security aspects of Core Network enhanced support
for Artificial Intelligence/Machine Learning (AI/ML)

V19.0.0 (Wzip)  2024/12  48 p.
Rapporteur:
Mr. Liu, Chang
China Mobile Com. Corporation

full Table of Contents for  TR 33.784  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions of terms, symbols and abbreviations  p. 8
3.1Terms  p. 8
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Overview  p. 9
5Key issues  p. 9
5.1Key Issue #1: Security aspects on enhancements to LCS to support AIML  p. 9
5.1.1Key issue details  p. 9
5.1.2Security Threats  p. 9
5.1.3Potential security requirements  p. 10
5.2Key Issue #2: Authorization mechanism of candidate VFL participants for the same VFL process  p. 10
5.2.1Key issue details  p. 10
5.2.2Security threats  p. 10
5.2.3Potential security requirements  p. 10
5.3Key Issue #3: Privacy of VFL between VFL participants  p. 11
5.3.1Description  p. 11
5.3.2Security threats  p. 11
5.3.3Potential security requirements  p. 11
5.4Key issue #4: Security of communication data used in VFL training process  p. 11
5.4.1Key issue details  p. 11
5.4.2Security threats  p. 11
5.4.3Potential security requirements  p. 11
6Solutions  p. 12
6.1Solution #1: Security aspects on enhancements to LCS to support AIML  p. 12
6.1.1Introduction  p. 12
6.1.2Solution details  p. 13
6.1.3Evaluation  p. 13
6.2Solution #2: LMF authorization mechanism in the AI/ML model retrieving scenarios  p. 14
6.2.1Introduction  p. 14
6.2.2Solution details  p. 14
6.2.3Evaluation  p. 14
6.3Solution #3: Solution for VFL member authorization  p. 14
6.3.1Introduction  p. 14
6.3.2Solution details  p. 14
6.3.2.1AF (VFL Server) requesting the NWDAF  p. 15
6.3.2.2NWDAF (VFL Server) requesting the AF  p. 16
6.3.3Evaluation  p. 17
6.4Solution #4: Authorization of VFL member selection  p. 17
6.4.1Introduction  p. 17
6.4.2Solution details  p. 18
6.4.2.1NWDAF is VFL Server  p. 18
6.4.2.2AF is VFL Server  p. 19
6.4.3Evaluation  p. 20
6.5Solution #5: Authorization of VFL participants involving NWDAF and AF  p. 21
6.5.1Introduction  p. 21
6.5.2Solution details  p. 22
6.5.2.1External AF acts as VFL Server  p. 22
6.5.2.2NWDAF acts as VFL Server and external AF as VFL client  p. 23
6.5.3Evaluation  p. 24
6.6Solution #6: Authorization mechanism through NRF and NEF for AF outside the PLMN  p. 25
6.6.1Introduction  p. 25
6.6.2Solution details  p. 25
6.6.3Evaluation  p. 26
6.7Solution #7: Authorization for selection of participant NWDAF instances for the 3rd party AF-initiated federated learning  p. 26
6.7.1Introduction  p. 26
6.7.2Solution details  p. 27
6.7.3Evaluation  p. 29
6.8Solution #8: Authorization for selection of participant AF for the NWDAF-initiated federated Learning  p. 29
6.8.1Introduction  p. 29
6.8.2Solution details  p. 30
6.8.3Evaluation  p. 31
6.9Solution #9: UE ID privacy protection of VFL between VFL members  p. 32
6.9.1Introduction  p. 32
6.9.2Solution details  p. 33
6.9.2.1Sample alignment procedure for Vertical Federated Learning when NWDAF is acting as the VFL server  p. 33
6.9.2.2Sample alignment procedure for Vertical Federated Learning when External AF is acting as the VFL server  p. 34
6.9.3Evaluation  p. 35
6.10Solution #10: Privacy of sample alignment  p. 35
6.10.1Introduction  p. 35
6.10.2Solution details  p. 35
6.10.3Evaluation  p. 36
6.11Solution #11: Protection of Privacy of VFL between VFL members  p. 37
6.11.1Introduction  p. 37
6.11.2Solution details  p. 37
6.11.2.1NWDAF acting as FL server  p. 37
6.11.2.2External AF acting as FL server  p. 38
6.11.3Evaluation  p. 39
6.12Solution #12: VFL sample alignment initialled by NWDAF  p. 39
6.12.1Introduction  p. 39
6.12.2Solution details  p. 39
6.12.3Evaluation  p. 40
6.13Solution #13: Privacy protect mechanism for sample alignment  p. 40
6.13.1Introduction  p. 40
6.13.2Solution details  p. 40
6.13.3Evaluation  p. 40
6.14Solution #14: Authorization for LCS Data Storage and Retrieval  p. 41
6.14.1Introduction  p. 41
6.14.2Solution details  p. 42
6.14.3Evaluation  p. 43
6.15Solution #15: Reuse the existing SBA mechanisms for protection of communication data in VFL training process.  p. 43
6.15.1Introduction  p. 43
6.15.2Solution details  p. 43
6.15.3Evaluation  p. 43
6.16Solution #16: LMF authorization for AI/ML model retrieval from NWDAF containing MTLF  p. 44
6.16.1Introduction  p. 44
6.16.2Solution details  p. 44
6.16.3Evaluation  p. 45
6.17Solution #17: Privacy of VFL between VFL members  p. 45
6.17.1Introduction  p. 45
6.17.2Solution details  p. 45
6.17.2.1General procedures  p. 45
6.17.3Evaluation  p. 46
7Conclusions  p. 46
7.1Conclusion on Key Issue #1  p. 46
7.2Conclusion on Key issue #2  p. 47
7.3Conclusion on Key Issue #3  p. 47
7.4Conclusion on Key issue #4  p. 47
$Change history  p. 48

Up   Top