Page 383 - Kaleidoscope Academic Conference Proceedings 2024
P. 383

Innovation and Digital Transformation for a Sustainable World
































                                            Figure 3 – The security risks of the CFN


           may use powerful computing resources to attack the network  data are difficult to clarify. Moreover, data usage is difficult
           or crack passwords. The CFN resource management systems  to trace, which can easily lead to the abuse and misuse of
           may also encounter excessive use by attackers and be unable  personal data.
           to process legal requests [11].
           Finally, the complexity of audit tracking also poses a major  4.  CFN SECURITY PROTECTION DESIGN
           challenge. The CFN that provides computing force services
           to numerous users and nodes requires auditing and tracking  4.1 CFN Security Protection Architecture
           the collaborative behavior of dispersed nodes. The addition
                                                              In order to ensure the security of computing force networks,
           of network elements such as CFN perception units and CFN
                                                              the security protection architecture design of the computing
           control units increases the complexity of the CFN structure,
                                                              force network is shown in the figure 4, which includes general
           making the auditing and tracking of the CFN more complex.
                                                              security, infrastructure security, orchestration management
                                                              security, operational service security and data security, based
           3.3 Risks to Operational Services Security
                                                              on the characteristics of the services provided by computing
           The operation services of the CFN provide a platform for  force networks and the security challenges they face.
           computing force output from multiple computing force nodes,  General security technology provides basic common
           allowing idle computing force resources to be fully utilized.  technical support for various links and elements of the CFN,
           But this approach also has the possibility of introducing  forming the foundation of the CFN security, mainly including
           insecure or malicious nodes, affecting the credibility of  identity authentication technology, isolation technology,
           the calculation results. Attackers or malicious nodes may  password technology, etc.
           also launch network attacks or perform data theft and other  Infrastructure  security  includes  computing  force
           attack behaviors. The CFN provides computing force trading  infrastructure security and network infrastructure security.
           services for a large number of users and nodes, but transaction  The convergence security of computing force and network
           management is complex and faces problems such as malicious  includes cloud computing security, edge computing security,
           billing and fee evasion caused by transaction participants  terminal computing security, SD-WAN and SRv6 integrated
           tampering or denying transaction results.          networking security and deterministic network security.
                                                              Security orchestration scheduling dynamically combines and
           3.4  Risks to Cross-layer Data Security            schedules security capabilities based on user needs in the
                                                              context of differentiated security levels at computing force
           From the perspective of cross layer data, the vast amount  nodes and varying security requirements for computing tasks.
           of data in various industries includes a large amount  Orchestration management security includes orchestration
           of personal privacy data, sensitive data, and confidential  security guarantee, intelligent security scheduling, and
           data. Once attacked or leaked, it will cause incalculable  computing force security control.
           consequences. Especially, enterprises collect a large amount  The security of operational services mainly ensures the
           of user information in their applications, which is transmitted  security of the CFN services, including three parts: open
           to the data for centralized storage. During the process of  security capabilities, operational security, and integrated
           data circulation, it is easy to lose ownership information of  application security. Among them, monitoring and auditing
           the data, and the rights, responsibilities, and benefits of the  computing force resources and transactions to achieve




                                                          – 339 –
   378   379   380   381   382   383   384   385   386   387   388