Page 311 - Kaleidoscope Academic Conference Proceedings 2024
P. 311

AN END-TO-END TRUSTWORTHY SCHEME FOR GREEN COMMUNICATIONS




                                                    1
                                    Qin Qiu ; Tianni Xu ; Gaoshan Zhang ; Hua Zhu ; Ben Zhou
                                                                  2
                                                                                     2
                                          1
                                                                           2
                                         1 China Mobile Communications Group Co., Ltd
                                    2 Organization: China Mobile Group Design Institute Co., Ltd.


                              ABSTRACT                        the cross-regional data transmission. Particularly, challenges
                                                              related  to  data  and  device  security  have  become  key
           Energy conservation has become a worldwide consensus in   obstacles  to  further  development.  During  the  collection,
           recent  years.  The  Chinese  government  has  proposed  the   transmission, and computing of data, there are three main
           east-data-west-computing  project  to  develop  large-scale   security  concerns,  including  untrusted  computing  noes,
           cross-regional green communications and computing. In the   immature  computing  security  capabilities,  and  unsecured
           process  of  balancing  computing  and  energy  resource   data transmission.
           demands  between  the  eastern  and  western  regions,  the
           security  concern  of  cross-regional  data  circulation  rises.   1) Untrusted computing nodes: The ubiquitous connection
           This  paper  presents  a  trustworthy  scheme  to  address  the   of various computing nodes in the computing network, such
           problem of untrusted computing nodes, immature computing   as clouds, edges, and terminals, leads to complex and diverse
           security  capabilities,  and  unsecured  data  transmission   security  exposure  surfaces.  However,  the  authentication
           within cross-regional data circulation. The solution focuses   mechanism  of  ubiquitous  computing  nodes  is  not  yet
           on building a secure and trustworthy environment to protect   established.  In  addition,  the  security  capability  between
           the device and data, ensuring the confidentiality, integrity,   computing nodes is different, and the credibility evaluation
           and  availability  of  data  usage.  Practical  deployment  and   and security authentication mechanism of computing nodes
           testing have demonstrated that our solution can effectively   are not yet mature.
           safeguard  data  privacy  and  security  in  the  carrier’s
           networks, enhancing the encryption performance of security   2) Immature  computing  security  capabilities:  The
           services by more than 20 times, providing a new security   computing power of ubiquitous computing nodes varies and
           paradigm  for  the  efficient  and  green  development  of  the   has differences in security capabilities. Trusted computing
           communications industry.                           and  security  capabilities  such  as  TEE  (Trusted  Execution
                                                              Environment)  are  not  commonly  deployed  on  computing
            Keywords – Green Communications, the East-data-west-  devices. Security risks exist in the computing environment
             computing Project, Data Security, Trustworthy Scheme   during sensitive data processing.
                          1.  INTRODUCTION                    3) Unsecured  data  transmission:  The  security  and
                                                              reliability of data transmission between computing nodes is
           To adhere to a path of green, environmentally friendly, and   the  basic  requirement  of  computing  network  security.  In
           sustainable  development,  China  has  promoted  the   east-data-west-computing project, data is transmitted across
           construction of the east-data-west-computing project. With   nodes  and  levels,  resulting  in  risks  such  as  theft  and
           the goal of green communications, the project encourages the   tampering.
           migration of data centers to the western regions. Leveraging
           the abundant renewable energy resources in the west regions,   To address these security problems, this paper proposes a
           it supports the storage and computing of data from the east   solution and has conducted practical verification. The results
           regions,  effectively  reducing  carbon  emissions  in  the   show  that  our  solution  can  effectively  secure  the  data
           telecommunications industry.                       transmission  process,  and  speeds  up  the  encryption
                                                              performance by more than 20 times compared with off-the-
           CNC (Coordination of Networking and Computing) [1] is   shelf encryption algorithms.
           the  core  technical  concept  to  achieve  the  east-data-west-
           computing project, which is implemented through a resource   2.  END-TO-END TRUSTWORTHY SCHEME
           scheduling system by integrating distributed computing and                DESIGN
           networking resources, achieving efficient resource allocation
           through real-time perception and scheduling. However, as   To  solve  the  problems  of  untrusted  computing  nodes,
           the project progresses, new security issues have arisen with   immature  computing  security  capabilities,  and  unsecured





          978-92-61-39091-4/CFP2268P @ITU 2024            – 267 –                                     Kaleidoscope
   306   307   308   309   310   311   312   313   314   315   316