Page 385 - Kaleidoscope Academic Conference Proceedings 2024
P. 385

Innovation and Digital Transformation for a Sustainable World




               kernel to runtime operations, and continuously monitor,  • Computing force network security scheduling can build
               analyze, and respond to business applications.     a security resource pool management platform, which
                                                                  integrates multiple security resource pools organically
             • Edge computing security can consider edge computing
                                                                  by connecting with security resource pools at different
               platform security from service authorization, platform
                                                                  layers [15, 16]. Based on the security level identification
               system security and user access security, and strive
                                                                  of computing force users, computing tasks, and
               to achieve user level network function security. And
                                                                  computing force nodes, intelligent orchestration of
               through data security storage technology, especially the
                                                                  software and hardware hybrid security components is
               built-in user model protection in artificial intelligence
                                                                  achieved, forming a unified security resource pool
               infrastructure, it promotes the construction of a reliable
                                                                  management capability.  At the same time, strict
               and secure operating environment throughout the entire
                                                                  monitoring and authorization should be carried out for
               process.                                           the behavior of orchestration management to prevent
                                                                  illegal users from exceeding their authority to schedule
           4.2.3  Network Infrastructure Security                 computing force network resources [17].
           In order to improve the security of network infrastructure,
                                                                • Computing security control involves analyzing the
           on the one hand, it is necessary to strengthen the security
                                                                  correlation between computing infrastructure resource
           protection of computing force networks from aspects such
                                                                  performance, operational status information, behavior
           as node trusted authentication and computing force network
                                                                  logs, computing force network security logs, traffic logs,
           management standards, ensuring multi-party security of
                                                                  and other security elements. It evaluates the credibility
           computing force network systems.  On the other hand,
                                                                  of tasks or users, detects and controls mining, security
           targeted protective measures need to be provided for new
                                                                  attacks, and other abuse of computing force. Measures
           technologies such as SRv6/G-SRv6, deterministic networks,
                                                                  such as limiting computing force usage, rejecting
           and next-generation SD WAN.
                                                                  computing force requests, or reducing computing force
             • In terms of node trusted authentication, it should  user credit are taken for security control.
               be ensured that each access node achieves full
               process security authentication at both hardware and  4.2.5  Operational Service Security
               software levels, achieving full process security and
                                                              The multi-source and ubiquitous computing nodes in
               trustworthiness; In terms of computing force network
                                                              computing force networks cannot guarantee the security
               management standards, a unified security management
                                                              and reliability of each node, and the pattern of data being
               standard should be established, and different nodes
                                                              dispersed to multiple computing force nodes for calculation
               should be included in a unified management system to
                                                              faces serious security risks.
               ensure the security and compliance of computing force
               network management.
                                                                • In order to ensure the security of computing resources
             • There are also some commonly used security protection  and computing services transactions,  blockchain
               methods for new technologies such as SRv6/G-SRv6,  technology provides new ideas with features such as
               deterministic networks, and next-generation SD WAN.  data traceability, difficulty in tampering, and automatic
               Common protection methods for these new technologies  execution of smart contracts.  The computing force
               include configuring access control list (ACL) rules  trading method based on smart contracts combined
               or using hash based message authentication code    with blockchain, utilizing the technological advantages
               (HMAC) to verify security schemes [6]. The SD-WAN  of blockchain decentralization and distributed data
               network is more complex, with security issues such as  synchronization and storage, can distribute computing
               unstable connections, data leakage, difficulty in identity  force transactions across various computing force
               authentication and access control, and increased network  resource nodes [18].
               attacks.  Encryption and tunneling technologies can
               be used to ensure data security, and threat detection  • In response to the inability of blockchain to solve
               and intrusion defense systems can be deployed to   problems such as trustworthy off chain data and secure
               strengthen security monitoring and log management.  on chain data, the combination of blockchain and privacy
               With effective identity authentication and access control  computing provides an effective technical means to
               mechanisms, the data transmission security of SD-WAN  solve the problem of data sharing, build a trustworthy
               can be protected.                                  operating environment, and achieve high-value data
                                                                  circulation [25]. The blockchain generates an on chain
           4.2.4  Orchestration Scheduling Security               data directory, which centrally manages multiple data
                                                                  elements and provides functions such as data retrieval,
           Security scheduling utilizes technologies such as computing  authorization, and authentication. For strongly private
           resource security notifications, active defense, and automated  data, with the help of secure multi computing, federated
           scheduling to achieve flexible coordination and automated  learning, and other privacy computing technologies,
           security scheduling capabilities [14].                 multiple joint computing, multi joint modeling, and




                                                          – 341 –
   380   381   382   383   384   385   386   387   388   389   390