Page 55 - Kaleidoscope Academic Conference Proceedings 2021
P. 55

requirements include QoS planning, QoS monitoring, QoS   Y.QKDN_BM can  be used as a  guideline  for  applying
           optimization, QoS  provisioning, QoS protection  and   service scenarios that utilize a QKDN from business points
           recovery, etc.                                     of view as well as for deployment and operation of a QKDN
                                                              from telecommunication operators’ points of view.
           For the end-to-end QoS assurance  of the QKDN, it is
           essential to define the scope of the QoS in association with a   Telecommunication operations, QKDN operators, or other
           QKDN, taking into consideration the relationship between   relevant stakeholders can act as players of QKDN business
           end-to-end QKDN QoS and  its  associated  network   roles. Players are involved in security application service-
           performance of underlying  QKDNs.  End-to-end QoS   related business  activities with  the  QKDN  environment.
           depends upon network performance of different sub-QKDNs:  Each player has at least one business role. In some cases,
           ingress and egress QKDN Access Networks (QAN) and a   however, one player can have more than one business role at
           QKDN Backbone Network (QBN).                       the same time. The identified security application service-
                                                              related business roles are shown in Figure 6.
           3.2   Ongoing work items on QKDN in ITU-T SG13
                                                              3.2.2   Integration of QKDN and secure storage network
                  Table 1 – Ongoing work items on QKDN
                                                              The purpose of introducing the  QKDN into current
             SG/Q                  Work item                  communication networks and cryptographic infrastructures
            Q16/13   Y.QKDN_BM : Quantum key distribution     is to enhance their security level by supplying highly secure
                    networks – Business role-based models     symmetric  keys to cryptographic applications.  A  Secure
                    Y.QKDN_frint : Framework for integration of  Storage Network (SSN) consists of multiple data servers and
                    QKDN and secure storage network           is supported  by a secret sharing scheme.  A  Public  Key
                    Y.QKDN-iwfr : Quantum key distribution networks  Infrastructure (PKI) plays an essential role again to realize
                    – interworking framework                  authentication, access control, and integrity protection in the
                    Y.QKDN-ml-fra : Quantum key distribution  SSN. Y.QKDN_frint shows a concept of integration of the
                    networks – Functional requirements and    QKDN with the PKI and the SSN. It also specifies functional
                    architecture to enable machine learning   requirements,  a  functional architecture model, reference
                    Y.QKDN-rsfr : Quantum key distribution networks  points and operational procedures for SSNs.
                    – resilience framework
                    Y.supp.QKDN-roadmap : Standardization roadmap  3.2.3   QKDN - Interworking framework
                    on Quantum Key Distribution Networks
            Q6/13   Y.QKDN-QoS-pa: Quantum key distribution   Constructing a large-scale QKDN which covers a wide area,
                    networks – QoS parameters                 may consist of multiple QKDNs and they are interworking
                    Y.QKDN-QoS-fa: Functional architecture of QoS  with each other. Therefore, Y.QKDN-iwfr mainly focuses on
                    assurance for quantum key distribution networks  the  interworking between QKDNs  supported by multiple
                    Y.QKDN-QoS-ml-req: Requirements of machine  QKDN providers. Figure 7 shows a conceptual interworking
                    learning based QoS assurance for quantum key  model between QKDNs.
                    distribution networks

           3.2.1   QKDN – Business role-based models

           Y.QKDN_BM describes business roles, business role-based
           models, and service scenarios in  a  QKDN from different
           deployment and operation perspectives.  Especially,
           Y.QKDN_BM  identifies  various  business  models  that
           require  security  application services with  a  QKDN  and
           exiting user networks.

                                                                     Figure 7 – Interworking between QKDNs


                                                              There are several issues to be standardized for interworking
                                                              between QKDNs with different technologies. Here, different
                                                              technologies can  be  used in QKDNs such as  key relay
                                                              encryption  methods,  key relay schemes, key relay
                                                              alternatives,  configurations of  the  QKDN controller, and
                                                              protocols in the key management layer, the QKDN control
                                                              layer and the QKDN management layer.


              Figure 6 – The owners of business roles in a QKDN




                                                           – li –
   50   51   52   53   54   55   56   57   58   59   60