Page 315 - Kaleidoscope Academic Conference Proceedings 2024
P. 315
Innovation and Digital Transformation for a Sustainable World
verify the secure and trustworthy protection capabilities security services, protect the privacy and security of CNC,
proposed in this paper. and offer technical support and practical evidence for a
Our solution can reduce the overall energy consumption by communication concept that emphasizes both "green" and
storing warm and cold data in the western region instead of "security".
in the eastern region. For example, taking storing 1000 TB
of data as an example, the energy consumption for storage is 5. CONCLUSION
about 22.68 kW for one day, and 143.64 kW for computing.
Typical economically active eastern regions such as This paper proposes a comprehensive technical solution
Zhejiang Province have an electricity bill of about 1.0 yuan. aimed at optimizing the use of computing resources,
But for Guizhou Province in the western region has an reducing energy consumption, and addressing security issues
electricity bill of about 0.5 yuan. Intuitively, the off-site introduced by cross-regional data flow. The implementation
storage of data can save 50% on electricity bills. In addition, of this solution in the context of the east-data-west-
Guizhou has abundant water resources and low average computing project has the following advantages over
temperatures. The use of clean energy can reduce carbon existing technologies:
emissions, and the suitable temperature can also reduce the
cooling energy consumption of operating datacenters. 1) Green Communications Practice: The solution
presented in this paper is based on the concept of green
In the deployment and testing, the capabilities of trusted communications. It explores the practical issues arising in
identification, trusted computing, trusted verification, and the east-data-west-computing project and provides a
high-speed cryptography mentioned in this paper all complete solution, thereby facilitating the practical
functioned normally and achieved the anticipated goals. implementation of the east-data-west-computing project and
Trusted identification uniformly issues trusted identities to pushing the communications industry towards a path of
the eastern node and western node, implementing device green, low-carbon, and sustainable development.
access management. Trusted computing builds secure
storage spaces within different nodes, strengthening key 2) Enhanced Security Assurance: Combining technologies
management of devices. Trusted verification uses the such as confidential computing, blockchain, and high-speed
blockchain to certify DPI log information, ensuring the encryption, the solution offers a solid technical foundation
integrity of data content. High-speed encryption builds a for the secure and trustworthy protection of CNC. Through
secure channel between nodes, completing data encryption actual deployment and testing, the solution has been proven
and decryption. Particularly, the GPU heterogeneous to effectively protect data privacy and device security in real
cryptographic acceleration technology increases the environments, ensuring the safety of cross-domain data flow.
encryption performance of SM2, SM3, and SM4 by 20-55
times compared with encryption without hardware
acceleration, as shown in Figure 6. 3) Innovative Data Management: The solution conducts
in-depth research and innovative applications in areas such
as the certification of computing devices, the establishment
of a trustworthy environment for heterogeneous computing
nodes, and the secure transmission of data in dynamic
environments. Through these measures, it effectively
achieves secure data circulation and trustworthy
management, enhancing the credibility and security of data
throughout its lifecycle in the resource scheduling process.
REFERENCES
[1] ITU, "Use cases for supporting the coordination of
computing and networking for Developing
Countries": https://www.itu.int/ITU-
Figure 6 - High-Speed Encryption Performance T/workprog/wp_item.aspx?isn=19170
Improvement
In real-world deployments, CPU chips that support TEE are [2] Rabimba Karanjai, Rowan Collier, Zhimin Gao,
not yet widely used, and GPUs are still a scarce resource in Lin Chen, Xinxin Fan, et al." Decentralized
datacenters. Therefore, our solution provides a partially Translator of Trust: Supporting Heterogeneous
deployed version. For example, we can only configure the TEE for Critical Infrastructure Protection.,"
blockchain capability to verify the east-west data Proceedings of the 5th ACM International
transmission, sacrificing some performance without using Symposium on Blockchain and Secure Critical
GPUs. We can also use pluggable TEE hardware devices for Infrastructure (BSCI '23). ACM, New York,
more flexible deployment. pp.249-264.2023.
This case in Guizhou demonstrates that the scheme proposed
in this paper can provide a reliable asset access method in [3] Clemens Brunner, Ulrich Gallersdörfer, Fabian
real environments, effectively reduce the operational costs of Knirsch, Dominik Engel, and Florian Matthes,
– 271 –