Page 314 - Kaleidoscope Academic Conference Proceedings 2024
P. 314

2024 ITU Kaleidoscope Academic Conference




           Employing blockchain technology for encoding and marking
           data  with  trustworthy  techniques,  this  approach  generates
           distributed data credentials based on blockchain, serving as
           the basis for data verification, authentication, and tracking,
           ensuring  the  security  and  trustworthiness  of  signed  data.
           Commercial  cryptographic  algorithm  and  hash  algorithms
           are used to ensure the authenticity, integrity, privacy, and
           security of data on the blockchain. The structure of one block
           and the chain is shown in Figure 4.



                                                                Figure 5 - CPU+GPU Heterogeneous Collaboration

                                                              The specific implementation methods are as follows:

                                                              1) Hardware Acceleration
                   Figure 4 - Blockchain chain structure
                                                              Using  GPU-based  hardware  acceleration  technology,  the
           Data  marking  technology  adopts  secure  computing  hash   parallel  processing  of  the  cryptographic  computing  for
           algorithms,  utilizing  the  decentralized  and  tamper-proof   encryption  and  decryption  are  transferred  to  the  GPU.
           technical  features  of  blockchain  to  safeguard  the  integrity   Leveraging  the  GPU's  vector  processing  units  and  high-
           and  credibility  of  data  throughout  its  lifecycle.  At  the   speed memory bandwidth, this technology rapidly processes
           transmission's start, the sender computes a hash value of the   the encryption and decryption computation for large-scale
           data through a HASH operation, resulting in a fixed-length   data, increasing the encryption algorithm's speed.
           hash value. Smart contracts deployed on the blockchain will
           automatically record the hash value, storing data signatures   2) Heterogeneous Computing Architecture
           in the distributed database as a unique identity mark for the
           data. Upon the data's arrival at the destination, the recipient   Our solution adopts a heterogeneous architecture based on
           computes the hash value of the data again and compares it   CPU+GPU,  the  computing  capabilities  of  both  CPU  and
           with the value stored on the blockchain to verify whether the   GPU  are  used  in  tandem.  The  cryptographic  computation
           data  has  been  tampered  with  or  lost  during  transmission.   process is divided into two parts. CPU is responsible for the
           Throughout  the  data  transmission  process,  the  nodes  and   control and scheduling of computing tasks. Meanwhile, GPU
           operations that data passes through will be recorded on the   handles  the  parallel  computing  of  the  commercial
           blockchain, providing users with a transparent and traceable   cryptographic algorithms. This specialized division of labor
           data circulation pathway.                          enhances the encryption efficiency.

           3.4   High-speed encryption                        3) Parallel Processing

           In the processes of data transmission and storage, to prevent   Parallel  processing  adaptations  are  carried  out  for  the
           data from being stolen by attackers, encryption algorithms   commercial  cryptographic  algorithms  such  as  SM2,  SM3,
           play a crucial role in ensuring data security. However, the   SM4, etc., by loading the message expansion, key expansion,
           cryptographic  computation  increases  the  overhead  of  the   and block encryption operations in the algorithms into the
           system,  which  contradicts  the  high  throughput  and  low   GPU, and dividing the assignment or logic operation tasks
           latency  requirements  of  the  resource  scheduling  system.   with low data correlation into each parallel computing unit.
           Traditional encryption technologies can no longer meet the   Therefore, the large batch of input data can be simplified into
           demands of high-speed data transfer.               small-scale data blocks Each block is assigned to different
                                                              computing units for parallel processing, fully utilizing the
           GPU  acceleration  technology  is  a  solution  for  hardware-  computing resources.
           acceleration  of  the  cryptographic  algorithms  based  on
           CPU+GPU heterogeneous computing architecture [4], aimed     4.  IMPLEMENTATION RESULTS
           at achieving low-latency encryption and decryption of data
           in nodes. This solution shifts traditional serial cryptographic   In this section, we take our practice in Guizhou Province as
           computation into parallel processing, the parallel principle is   a case study. Guizhou locates in the western of China, and
           as  shown  in  Figure  5.  Utilizing  hardware-accelerated   has abundant green hydropower and sufficient land scale. It
           commercial  cryptographic  algorithms  enables  fast  and   has already established numerous datacenters, serving as a
           secure processing of large files in the resource scheduling   western hub node in the east-data-west-computing project.
           system using the commercial cryptographic algorithms such   Our study selects the DPI log data migration scenario as a
           as  SM2,  SM3,  SM4,  etc.  This  method  increases  the   "test field", which generates 350TB of data every day, to
           encryption  speed  and  enhances  the  efficiency  of  the   fully leverage the real-world environment in Guizhou and
           algorithms, providing strong security for data transfer.





                                                          – 270 –
   309   310   311   312   313   314   315   316   317   318   319