Page 55 - Kaleidoscope Academic Conference Proceedings 2021
P. 55
requirements include QoS planning, QoS monitoring, QoS Y.QKDN_BM can be used as a guideline for applying
optimization, QoS provisioning, QoS protection and service scenarios that utilize a QKDN from business points
recovery, etc. of view as well as for deployment and operation of a QKDN
from telecommunication operators’ points of view.
For the end-to-end QoS assurance of the QKDN, it is
essential to define the scope of the QoS in association with a Telecommunication operations, QKDN operators, or other
QKDN, taking into consideration the relationship between relevant stakeholders can act as players of QKDN business
end-to-end QKDN QoS and its associated network roles. Players are involved in security application service-
performance of underlying QKDNs. End-to-end QoS related business activities with the QKDN environment.
depends upon network performance of different sub-QKDNs: Each player has at least one business role. In some cases,
ingress and egress QKDN Access Networks (QAN) and a however, one player can have more than one business role at
QKDN Backbone Network (QBN). the same time. The identified security application service-
related business roles are shown in Figure 6.
3.2 Ongoing work items on QKDN in ITU-T SG13
3.2.2 Integration of QKDN and secure storage network
Table 1 – Ongoing work items on QKDN
The purpose of introducing the QKDN into current
SG/Q Work item communication networks and cryptographic infrastructures
Q16/13 Y.QKDN_BM : Quantum key distribution is to enhance their security level by supplying highly secure
networks – Business role-based models symmetric keys to cryptographic applications. A Secure
Y.QKDN_frint : Framework for integration of Storage Network (SSN) consists of multiple data servers and
QKDN and secure storage network is supported by a secret sharing scheme. A Public Key
Y.QKDN-iwfr : Quantum key distribution networks Infrastructure (PKI) plays an essential role again to realize
– interworking framework authentication, access control, and integrity protection in the
Y.QKDN-ml-fra : Quantum key distribution SSN. Y.QKDN_frint shows a concept of integration of the
networks – Functional requirements and QKDN with the PKI and the SSN. It also specifies functional
architecture to enable machine learning requirements, a functional architecture model, reference
Y.QKDN-rsfr : Quantum key distribution networks points and operational procedures for SSNs.
– resilience framework
Y.supp.QKDN-roadmap : Standardization roadmap 3.2.3 QKDN - Interworking framework
on Quantum Key Distribution Networks
Q6/13 Y.QKDN-QoS-pa: Quantum key distribution Constructing a large-scale QKDN which covers a wide area,
networks – QoS parameters may consist of multiple QKDNs and they are interworking
Y.QKDN-QoS-fa: Functional architecture of QoS with each other. Therefore, Y.QKDN-iwfr mainly focuses on
assurance for quantum key distribution networks the interworking between QKDNs supported by multiple
Y.QKDN-QoS-ml-req: Requirements of machine QKDN providers. Figure 7 shows a conceptual interworking
learning based QoS assurance for quantum key model between QKDNs.
distribution networks
3.2.1 QKDN – Business role-based models
Y.QKDN_BM describes business roles, business role-based
models, and service scenarios in a QKDN from different
deployment and operation perspectives. Especially,
Y.QKDN_BM identifies various business models that
require security application services with a QKDN and
exiting user networks.
Figure 7 – Interworking between QKDNs
There are several issues to be standardized for interworking
between QKDNs with different technologies. Here, different
technologies can be used in QKDNs such as key relay
encryption methods, key relay schemes, key relay
alternatives, configurations of the QKDN controller, and
protocols in the key management layer, the QKDN control
layer and the QKDN management layer.
Figure 6 – The owners of business roles in a QKDN
– li –