Page 387 - Kaleidoscope Academic Conference Proceedings 2024
P. 387

Innovation and Digital Transformation for a Sustainable World




           The proposed solution has been validated on the CFN. In  [6] C. Yuan, Y. Su, and W. Zhao, “Research on security
           practical business scenarios such as system security log data  system for computing power networks,” Information
           encryption and retention, key technologies such as computing  and Communication Technology and Policy, vol. 49,
           force node security management, cross domain data trusted  no. 2, p. 82, 2023.
           computing, and trusted transmission have been applied. The
           results verified the security and compliance capabilities of  [7] H. Jiang and X. Huang, “A user identity credibility
           blockchain, trusted computing, and other technologies for  evaluation method based on user behavior in
           data flow in trusted systems under high traffic pressure. This  cloud environment,”  Guangdong Communication
           platform supports various types of data, especially in the  Technology, 2021.
           trusted encryption and transmission of GB and TB level
                                                               [8] J. M. B. Murcia, J. F. P. Zarca, A. M. Zarca,
           files.  The successful application of the above scenarios
                                                                  and A. Skármeta, “By-default security orchestration
           provides technical accumulation for external expansion of
                                                                  on distributed edge/cloud computing framework,” in
           cross regional data communication in the future.
                                                                  2023 IEEE 9th International Conference on Network
                                                                  Softwarization (NetSoft).  IEEE, 2023, pp. 504–509.
                           6.  CONCLUSION
           The close integration of computing force infrastructure  [9] T. Zhang, C. Xu, L. Yibo, K. Jiawen, and K. Xiaohui,
           and mobile communication networks forms a new type     “Active defense method for computing power networks
           of information infrastructure with computing as the center  based on deep reinforcement learning,” Chinese
           and network as the foundation.  The new architecture,  Science: Information Science, no. 12, pp. 2372–2385,
           new technologies, and new services of the computing force  2023.
           network have introduced new security risks, especially the
                                                              [10] J. Qin, Z. Ma, P. Duan, and S. Luo, “Privacy protection
           flat and layered network architecture that integrates cloud and
                                                                  scheme of transcation data supporting zero-knowledge
           network, which has introduced more attack interfaces. There
                                                                  proof,” Information Security and Communications
           are also many risks such as uncontrolled use of computing
                                                                  Privacy, no. 10, pp. 38–51, 2022.
           force, abuse of computing force, untrustworthy computing
           results, and data being compromised and stolen during the
                                                              [11] K. Gao, D. Li, and L. Chen, “Security architecture
           flow process. On the one hand, we need to collect and analyze
                                                                  and key technologies for computing network resource
           these risks of computing force networks and take security
                                                                  management,”   Information  and  communication
           measures to address them. On the other hand, we will make
                                                                  technology, vol. 17, no. 3, pp. 13–20, 2023.
           greater contributions to the application of the computing force
           network in various fields such as cloud computing business.
                                                              [12] S. Pandey, P. C. Pathak, S. Tripathi, S. Halwai,
                                                                  S. Aggarwal, and N. Nishant, “Security risks and their
                            REFERENCES
                                                                  mitigation strategies: Cloud computing perspective,” in
                                                                  2023 10th IEEE Uttar Pradesh Section International
            [1] H. Yao, X. Duan, and Y. Fu, “A computing-aware
                                                                  Conference on Electrical, Electronics and Computer
               routing protocol for computing force network,” in 2022
                                                                  Engineering (UPCON), vol. 10.  IEEE, 2023, pp.
               International Conference on Service Science (ICSS).
                                                                  1015–1019.
               IEEE, 2022, pp. 137–141.
                                                              [13] Y. Feng,  “The application of mfa multi-factor
            [2] [ITU-T Y.2501], Recommendation ITU-T Y.2501
                                                                  unified identity authentication platform based on zero
               (2021), Computing power network – Framework and
                                                                  trust architecture,” Network Security Technology and
               architecture.
                                                                  Applications, pp. 22–23, 2024.
            [3] Q. Qiu, T. Xu, L. Yu, x. Lv, J. Yuan, F. Zhang,
               and B. Zhang, “Computing force network security  [14] M. Król, S. Mastorakis, D. Oran, and D. Kutscher,
               architecture and data security governance technology,”  “Compute first networking:  Distributed computing
               Journal of Information Security Research, vol. 8, no. 4,  meets icn,” in Proceedings of the 6th ACM Conference
               p. 340, 2022.                                      on Information-Centric Networking, 2019, pp. 67–77.
            [4] Y. Liu, Y. Zhang, and M. Wang, “Research on the  [15] B. Liu, J. Mao, L. Xu, R. Hu, and X. Chen,
               security architecture of artificial intelligence computing  “Cfn-dyncast:  Load balancing the edges via the
               power infrastructure,”  Research on Information    network,” in 2021 IEEE Wireless Communications and
               Security, vol. 10, pp. 109–113, 2024.              Networking Conference Workshops (WCNCW). IEEE,
                                                                  2021, pp. 1–6.
            [5] W. Zhu, D. Jiangfan, L. Yuhua, D. Wang, and
               X. Tang, “Research on computing power network  [16] Z.  Cheng,  “Research  and  practical  analysis
               security and data security governance technology,”  of  security  resource  pool  security  component
               Telecommunications Engineering Technology and      service orchestration,”  Information security and
               Standardization, vol. 37, pp. 12–17, 2024.         communication confidentiality, no. 6, pp. 66–80, 2023.




                                                          – 343 –
   382   383   384   385   386   387   388   389   390   391   392