Page 387 - Kaleidoscope Academic Conference Proceedings 2024
P. 387
Innovation and Digital Transformation for a Sustainable World
The proposed solution has been validated on the CFN. In [6] C. Yuan, Y. Su, and W. Zhao, “Research on security
practical business scenarios such as system security log data system for computing power networks,” Information
encryption and retention, key technologies such as computing and Communication Technology and Policy, vol. 49,
force node security management, cross domain data trusted no. 2, p. 82, 2023.
computing, and trusted transmission have been applied. The
results verified the security and compliance capabilities of [7] H. Jiang and X. Huang, “A user identity credibility
blockchain, trusted computing, and other technologies for evaluation method based on user behavior in
data flow in trusted systems under high traffic pressure. This cloud environment,” Guangdong Communication
platform supports various types of data, especially in the Technology, 2021.
trusted encryption and transmission of GB and TB level
[8] J. M. B. Murcia, J. F. P. Zarca, A. M. Zarca,
files. The successful application of the above scenarios
and A. Skármeta, “By-default security orchestration
provides technical accumulation for external expansion of
on distributed edge/cloud computing framework,” in
cross regional data communication in the future.
2023 IEEE 9th International Conference on Network
Softwarization (NetSoft). IEEE, 2023, pp. 504–509.
6. CONCLUSION
The close integration of computing force infrastructure [9] T. Zhang, C. Xu, L. Yibo, K. Jiawen, and K. Xiaohui,
and mobile communication networks forms a new type “Active defense method for computing power networks
of information infrastructure with computing as the center based on deep reinforcement learning,” Chinese
and network as the foundation. The new architecture, Science: Information Science, no. 12, pp. 2372–2385,
new technologies, and new services of the computing force 2023.
network have introduced new security risks, especially the
[10] J. Qin, Z. Ma, P. Duan, and S. Luo, “Privacy protection
flat and layered network architecture that integrates cloud and
scheme of transcation data supporting zero-knowledge
network, which has introduced more attack interfaces. There
proof,” Information Security and Communications
are also many risks such as uncontrolled use of computing
Privacy, no. 10, pp. 38–51, 2022.
force, abuse of computing force, untrustworthy computing
results, and data being compromised and stolen during the
[11] K. Gao, D. Li, and L. Chen, “Security architecture
flow process. On the one hand, we need to collect and analyze
and key technologies for computing network resource
these risks of computing force networks and take security
management,” Information and communication
measures to address them. On the other hand, we will make
technology, vol. 17, no. 3, pp. 13–20, 2023.
greater contributions to the application of the computing force
network in various fields such as cloud computing business.
[12] S. Pandey, P. C. Pathak, S. Tripathi, S. Halwai,
S. Aggarwal, and N. Nishant, “Security risks and their
REFERENCES
mitigation strategies: Cloud computing perspective,” in
2023 10th IEEE Uttar Pradesh Section International
[1] H. Yao, X. Duan, and Y. Fu, “A computing-aware
Conference on Electrical, Electronics and Computer
routing protocol for computing force network,” in 2022
Engineering (UPCON), vol. 10. IEEE, 2023, pp.
International Conference on Service Science (ICSS).
1015–1019.
IEEE, 2022, pp. 137–141.
[13] Y. Feng, “The application of mfa multi-factor
[2] [ITU-T Y.2501], Recommendation ITU-T Y.2501
unified identity authentication platform based on zero
(2021), Computing power network – Framework and
trust architecture,” Network Security Technology and
architecture.
Applications, pp. 22–23, 2024.
[3] Q. Qiu, T. Xu, L. Yu, x. Lv, J. Yuan, F. Zhang,
and B. Zhang, “Computing force network security [14] M. Król, S. Mastorakis, D. Oran, and D. Kutscher,
architecture and data security governance technology,” “Compute first networking: Distributed computing
Journal of Information Security Research, vol. 8, no. 4, meets icn,” in Proceedings of the 6th ACM Conference
p. 340, 2022. on Information-Centric Networking, 2019, pp. 67–77.
[4] Y. Liu, Y. Zhang, and M. Wang, “Research on the [15] B. Liu, J. Mao, L. Xu, R. Hu, and X. Chen,
security architecture of artificial intelligence computing “Cfn-dyncast: Load balancing the edges via the
power infrastructure,” Research on Information network,” in 2021 IEEE Wireless Communications and
Security, vol. 10, pp. 109–113, 2024. Networking Conference Workshops (WCNCW). IEEE,
2021, pp. 1–6.
[5] W. Zhu, D. Jiangfan, L. Yuhua, D. Wang, and
X. Tang, “Research on computing power network [16] Z. Cheng, “Research and practical analysis
security and data security governance technology,” of security resource pool security component
Telecommunications Engineering Technology and service orchestration,” Information security and
Standardization, vol. 37, pp. 12–17, 2024. communication confidentiality, no. 6, pp. 66–80, 2023.
– 343 –