Page 385 - Kaleidoscope Academic Conference Proceedings 2024
P. 385
Innovation and Digital Transformation for a Sustainable World
kernel to runtime operations, and continuously monitor, • Computing force network security scheduling can build
analyze, and respond to business applications. a security resource pool management platform, which
integrates multiple security resource pools organically
• Edge computing security can consider edge computing
by connecting with security resource pools at different
platform security from service authorization, platform
layers [15, 16]. Based on the security level identification
system security and user access security, and strive
of computing force users, computing tasks, and
to achieve user level network function security. And
computing force nodes, intelligent orchestration of
through data security storage technology, especially the
software and hardware hybrid security components is
built-in user model protection in artificial intelligence
achieved, forming a unified security resource pool
infrastructure, it promotes the construction of a reliable
management capability. At the same time, strict
and secure operating environment throughout the entire
monitoring and authorization should be carried out for
process. the behavior of orchestration management to prevent
illegal users from exceeding their authority to schedule
4.2.3 Network Infrastructure Security computing force network resources [17].
In order to improve the security of network infrastructure,
• Computing security control involves analyzing the
on the one hand, it is necessary to strengthen the security
correlation between computing infrastructure resource
protection of computing force networks from aspects such
performance, operational status information, behavior
as node trusted authentication and computing force network
logs, computing force network security logs, traffic logs,
management standards, ensuring multi-party security of
and other security elements. It evaluates the credibility
computing force network systems. On the other hand,
of tasks or users, detects and controls mining, security
targeted protective measures need to be provided for new
attacks, and other abuse of computing force. Measures
technologies such as SRv6/G-SRv6, deterministic networks,
such as limiting computing force usage, rejecting
and next-generation SD WAN.
computing force requests, or reducing computing force
• In terms of node trusted authentication, it should user credit are taken for security control.
be ensured that each access node achieves full
process security authentication at both hardware and 4.2.5 Operational Service Security
software levels, achieving full process security and
The multi-source and ubiquitous computing nodes in
trustworthiness; In terms of computing force network
computing force networks cannot guarantee the security
management standards, a unified security management
and reliability of each node, and the pattern of data being
standard should be established, and different nodes
dispersed to multiple computing force nodes for calculation
should be included in a unified management system to
faces serious security risks.
ensure the security and compliance of computing force
network management.
• In order to ensure the security of computing resources
• There are also some commonly used security protection and computing services transactions, blockchain
methods for new technologies such as SRv6/G-SRv6, technology provides new ideas with features such as
deterministic networks, and next-generation SD WAN. data traceability, difficulty in tampering, and automatic
Common protection methods for these new technologies execution of smart contracts. The computing force
include configuring access control list (ACL) rules trading method based on smart contracts combined
or using hash based message authentication code with blockchain, utilizing the technological advantages
(HMAC) to verify security schemes [6]. The SD-WAN of blockchain decentralization and distributed data
network is more complex, with security issues such as synchronization and storage, can distribute computing
unstable connections, data leakage, difficulty in identity force transactions across various computing force
authentication and access control, and increased network resource nodes [18].
attacks. Encryption and tunneling technologies can
be used to ensure data security, and threat detection • In response to the inability of blockchain to solve
and intrusion defense systems can be deployed to problems such as trustworthy off chain data and secure
strengthen security monitoring and log management. on chain data, the combination of blockchain and privacy
With effective identity authentication and access control computing provides an effective technical means to
mechanisms, the data transmission security of SD-WAN solve the problem of data sharing, build a trustworthy
can be protected. operating environment, and achieve high-value data
circulation [25]. The blockchain generates an on chain
4.2.4 Orchestration Scheduling Security data directory, which centrally manages multiple data
elements and provides functions such as data retrieval,
Security scheduling utilizes technologies such as computing authorization, and authentication. For strongly private
resource security notifications, active defense, and automated data, with the help of secure multi computing, federated
scheduling to achieve flexible coordination and automated learning, and other privacy computing technologies,
security scheduling capabilities [14]. multiple joint computing, multi joint modeling, and
– 341 –