Page 311 - Kaleidoscope Academic Conference Proceedings 2024
P. 311
AN END-TO-END TRUSTWORTHY SCHEME FOR GREEN COMMUNICATIONS
1
Qin Qiu ; Tianni Xu ; Gaoshan Zhang ; Hua Zhu ; Ben Zhou
2
2
1
2
1 China Mobile Communications Group Co., Ltd
2 Organization: China Mobile Group Design Institute Co., Ltd.
ABSTRACT the cross-regional data transmission. Particularly, challenges
related to data and device security have become key
Energy conservation has become a worldwide consensus in obstacles to further development. During the collection,
recent years. The Chinese government has proposed the transmission, and computing of data, there are three main
east-data-west-computing project to develop large-scale security concerns, including untrusted computing noes,
cross-regional green communications and computing. In the immature computing security capabilities, and unsecured
process of balancing computing and energy resource data transmission.
demands between the eastern and western regions, the
security concern of cross-regional data circulation rises. 1) Untrusted computing nodes: The ubiquitous connection
This paper presents a trustworthy scheme to address the of various computing nodes in the computing network, such
problem of untrusted computing nodes, immature computing as clouds, edges, and terminals, leads to complex and diverse
security capabilities, and unsecured data transmission security exposure surfaces. However, the authentication
within cross-regional data circulation. The solution focuses mechanism of ubiquitous computing nodes is not yet
on building a secure and trustworthy environment to protect established. In addition, the security capability between
the device and data, ensuring the confidentiality, integrity, computing nodes is different, and the credibility evaluation
and availability of data usage. Practical deployment and and security authentication mechanism of computing nodes
testing have demonstrated that our solution can effectively are not yet mature.
safeguard data privacy and security in the carrier’s
networks, enhancing the encryption performance of security 2) Immature computing security capabilities: The
services by more than 20 times, providing a new security computing power of ubiquitous computing nodes varies and
paradigm for the efficient and green development of the has differences in security capabilities. Trusted computing
communications industry. and security capabilities such as TEE (Trusted Execution
Environment) are not commonly deployed on computing
Keywords – Green Communications, the East-data-west- devices. Security risks exist in the computing environment
computing Project, Data Security, Trustworthy Scheme during sensitive data processing.
1. INTRODUCTION 3) Unsecured data transmission: The security and
reliability of data transmission between computing nodes is
To adhere to a path of green, environmentally friendly, and the basic requirement of computing network security. In
sustainable development, China has promoted the east-data-west-computing project, data is transmitted across
construction of the east-data-west-computing project. With nodes and levels, resulting in risks such as theft and
the goal of green communications, the project encourages the tampering.
migration of data centers to the western regions. Leveraging
the abundant renewable energy resources in the west regions, To address these security problems, this paper proposes a
it supports the storage and computing of data from the east solution and has conducted practical verification. The results
regions, effectively reducing carbon emissions in the show that our solution can effectively secure the data
telecommunications industry. transmission process, and speeds up the encryption
performance by more than 20 times compared with off-the-
CNC (Coordination of Networking and Computing) [1] is shelf encryption algorithms.
the core technical concept to achieve the east-data-west-
computing project, which is implemented through a resource 2. END-TO-END TRUSTWORTHY SCHEME
scheduling system by integrating distributed computing and DESIGN
networking resources, achieving efficient resource allocation
through real-time perception and scheduling. However, as To solve the problems of untrusted computing nodes,
the project progresses, new security issues have arisen with immature computing security capabilities, and unsecured
978-92-61-39091-4/CFP2268P @ITU 2024 – 267 – Kaleidoscope