Page 384 - Kaleidoscope Academic Conference Proceedings 2024
P. 384

2024 ITU Kaleidoscope Academic Conference
































                                       Figure 4 – The security protection architecture of CFN



           distributed computing force security and unified operation  function mode to achieve ubiquitous and secure
           is currently the focus of attention.                   service of passwords.  By deeply integrating CFN
           Data security runs through all levels of the CFN security,  encryption technology with identity authentication,
           mainly including data security protection, data flow security,  authorized access, and using commercial passwords for
           computing security, etc., to ensure that data is effectively  signature verification and summary calculation of data
           protected and legally utilized throughout its entire lifecycle.  information, the integrity and confidentiality of data
                                                                  information can be guaranteed.
           4.2 CFN Security Protection Requirement
                                                              4.2.2  Computing Force Infrastructure Security
           4.2.1 General Security
                                                              Computing infrastructure includes cloud computing, edge
           The general security protection requirements mainly include  computing and terminal computing, which need security
           requirements for identity authentication, isolation technology,  protection at the physical, virtualization, business, operation
           and password technology.                           and maintenance management levels.

             • It is particularly important to authenticate the  • The traditional security of computing infrastructure
               identity of access subjects in the CFN. Common     needs to be considered from the perspectives of physical
               identity authentication technologies include password  security, network communication security, computing
               authentication, dual factor authentication, and digital  environment security and data application security. And
               certificate authentication.  In order to improve the  it is necessary to emphasize the importance of ensuring
               security and accuracy of user identity authentication,  the stability and security of the basic software and
               new technologies such as zero trust architecture or  hardware supply chain, and preventing software and
               mobile authentication, multi-factor authentication[13],  hardware supply from being restricted by people or
               continuous identity authentication,  and enhanced  having security risks[3].
               identity authentication can be used.
                                                                • More targeted, a series of protective measures can be
             • The isolation security of the computing force network  implemented for cloud computing security, such as
               should provide users with dedicated network tunnels,  installing firewalls and other security devices to protect
               and use QoS, network slicing, and other methods to  edge security. In addition, by defining different security
               divide separate channels for high security level slicing,  zones, the goal of cross-domain access control can be
               achieving business logic isolation. By optimizing the  achieved, thereby ensuring the security and reliability of
               security architecture design of the underlying carrier  the cloud computing environment. Cloud native security
               network and refining the policy control between security  is to make full use of platform-native security resources,
               domains, the overall resource isolation and traffic  by strengthening security investment in the early stages
               isolation of the business system can be achieved.  of cloud native development, ensuring supply chain
                                                                  security and image security. In the process of container
             • The large-scale application of passwords in the    orchestration management, it is necessary to implement
               computing force network needs to seek a new password  comprehensive protection from the operating system




                                                          – 340 –
   379   380   381   382   383   384   385   386   387   388   389