EconPapers    
Economics at your fingertips  
 

Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture

Peng Li and Jianing Du

International Journal of Network Management, 2025, vol. 35, issue 2

Abstract: The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6th Generation (6G). As brand development relies more on cloud‐based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre‐processing brand design data with Z‐score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE‐QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE‐QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1‐score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE‐QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI‐powered brand design services, highlighting the importance of creative encryption, real‐time monitoring, and 6G network slicing to meet contemporary data security standards.

Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1002/nem.70009

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wly:intnem:v:35:y:2025:i:2:n:e70009

Access Statistics for this article

More articles in International Journal of Network Management from John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().

 
Page updated 2025-03-22
Handle: RePEc:wly:intnem:v:35:y:2025:i:2:n:e70009