Page 383 - Kaleidoscope Academic Conference Proceedings 2024
P. 383
Innovation and Digital Transformation for a Sustainable World
Figure 3 – The security risks of the CFN
may use powerful computing resources to attack the network data are difficult to clarify. Moreover, data usage is difficult
or crack passwords. The CFN resource management systems to trace, which can easily lead to the abuse and misuse of
may also encounter excessive use by attackers and be unable personal data.
to process legal requests [11].
Finally, the complexity of audit tracking also poses a major 4. CFN SECURITY PROTECTION DESIGN
challenge. The CFN that provides computing force services
to numerous users and nodes requires auditing and tracking 4.1 CFN Security Protection Architecture
the collaborative behavior of dispersed nodes. The addition
In order to ensure the security of computing force networks,
of network elements such as CFN perception units and CFN
the security protection architecture design of the computing
control units increases the complexity of the CFN structure,
force network is shown in the figure 4, which includes general
making the auditing and tracking of the CFN more complex.
security, infrastructure security, orchestration management
security, operational service security and data security, based
3.3 Risks to Operational Services Security
on the characteristics of the services provided by computing
The operation services of the CFN provide a platform for force networks and the security challenges they face.
computing force output from multiple computing force nodes, General security technology provides basic common
allowing idle computing force resources to be fully utilized. technical support for various links and elements of the CFN,
But this approach also has the possibility of introducing forming the foundation of the CFN security, mainly including
insecure or malicious nodes, affecting the credibility of identity authentication technology, isolation technology,
the calculation results. Attackers or malicious nodes may password technology, etc.
also launch network attacks or perform data theft and other Infrastructure security includes computing force
attack behaviors. The CFN provides computing force trading infrastructure security and network infrastructure security.
services for a large number of users and nodes, but transaction The convergence security of computing force and network
management is complex and faces problems such as malicious includes cloud computing security, edge computing security,
billing and fee evasion caused by transaction participants terminal computing security, SD-WAN and SRv6 integrated
tampering or denying transaction results. networking security and deterministic network security.
Security orchestration scheduling dynamically combines and
3.4 Risks to Cross-layer Data Security schedules security capabilities based on user needs in the
context of differentiated security levels at computing force
From the perspective of cross layer data, the vast amount nodes and varying security requirements for computing tasks.
of data in various industries includes a large amount Orchestration management security includes orchestration
of personal privacy data, sensitive data, and confidential security guarantee, intelligent security scheduling, and
data. Once attacked or leaked, it will cause incalculable computing force security control.
consequences. Especially, enterprises collect a large amount The security of operational services mainly ensures the
of user information in their applications, which is transmitted security of the CFN services, including three parts: open
to the data for centralized storage. During the process of security capabilities, operational security, and integrated
data circulation, it is easy to lose ownership information of application security. Among them, monitoring and auditing
the data, and the rights, responsibilities, and benefits of the computing force resources and transactions to achieve
– 339 –