Page 386 - Kaleidoscope Academic Conference Proceedings 2024
P. 386

2024 ITU Kaleidoscope Academic Conference




               privacy queries can be performed without leaving the  5.2  End-to-end Transmission Security
               original data.
                                                              The application diagram of the scheme is shown in Figure 5.
           4.2.6  Data Security                               The underlying layer of the scheme is adapted to blockchain
                                                              technology,  innovatively applying four core security
           In response to serious data security risks such as network  capabilities, namely trusted identification, trusted computing,
           attacks and data privacy leaks faced by the integration of  trusted verification and high-speed password computing,
           computing force and networking, data flow security can  to provide trusted services, supporting the implementation
           be ensured through technologies such as encrypted traffic  of computing force security identification, secure network
           monitoring, traceability, data labeling and classification  connection, security scheduling and other business scenarios,
           grading. Privacy protection and data value conversion can be  ensuring the full security and trustworthiness of the data node
           achieved based on privacy computing technology to ensure  side and transmission side.
           the security and credibility of the CFN.

             • Data security protection can use AI human-machine
               collaboration and SOAR orchestration automation
               response technology to coordinate the scheduling of
               resources in various domains of the computing force
               network in network defense.  Through situational
               awareness, encrypted traffic monitoring and analysis,
               and graph based network tracking and tracing
               technology, the entire process, all elements, and entire
               industry chain supervision of computing force network   Figure 5 – The application of the case
               scheduling can be achieved.
                                                                • Trusted identification: By utilizing the decentralized
             • Data flow security involves identifying internal and
                                                                  identity identification technology of blockchain, access
               external risks, comprehensively identifying data flow
                                                                  authentication access points are established in the
               pathways and security environments, and establishing
                                                                  computing force network as professional security
               key data flow security risk indicators.  Based on
                                                                  identity verification and certification institutions, issuing
               data classification and labeling, utilizing full link
                                                                  identity identification to device nodes and CFN users
               data tracking technology to achieve normal operational
                                                                  accessing the computing force network. Build a unified
               monitoring.
                                                                  and cross system trusted identity tag for data through
             • Privacy computing aims to address privacy protection  identity identification, achieving initial screening of data
               issues during data sharing, computation, and analysis  credibility and permission management [20].
               processes. In order to achieve the three major goals of
                                                                • Trusted computing:  Deploy the trusted execution
               privacy computing in computing force networks, namely
                                                                  environment in various nodes of the computing force
               data available but not visible, usage controllable and
                                                                  network, and deploy the key management system in the
               measurable, and data computable but not recognizable,
                                                                  trusted execution environment to manage the generation,
               solutions can be developed separately from secure
                                                                  distribution, storage, access, update, and revocation of
               computing, cross domain control, and anonymization
                                                                  keys. Nodes in computing force networks can perform
               technologies [19].
                                                                  identity verification and encrypted communication
                                                                  through key management systems, ensuring security and
                       5. CFN SECURITY CASE
                                                                  reliability.
           5.1  Overview                                        • Trusted verification: By utilizing the decentralized and
                                                                  tamper proof technology features of blockchain, we
           With the rapid expansion of computing force networks,
                                                                  build cross system and cross node data flow tagging
           security threats and attack methods are constantly emerging,
                                                                  and authentication capabilities, achieving controllable
           making it difficult to control the security and stability
                                                                  data outflow and perceptible data flow.
           of computing nodes.    In response to the security
           issues of computing force nodes themselves and data  • High speed password computing: In computing force
           transmission between computing force nodes, this case is  networks, a heterogeneous computing architecture
           aimed at scheduling cross domain computing resources and  of CPU and GPU is used to address the issue
           implementing computing tasks. A secure and trustworthy  of processing speed for large file data encryption
           solution is used to solve the trust problem of important files  and decryption, achieving hardware acceleration for
           and data being stored and read from different locations. This  password algorithms. In the scenario of large files in
           case ensures the trustworthiness of nodes and the efficient and  the computing force network, the encryption algorithm
           secure flow of data, making it a typical application scenario  is accelerated to achieve high-performance encryption
           for computing force network security.                  processing.



                                                          – 342 –
   381   382   383   384   385   386   387   388   389   390   391