期刊文献+

算力网络业务安全技术研究 被引量:3

Research on Security Technology for Computing Force Network Service
下载PDF
导出
摘要 随着数字经济时代的发展,新兴技术、应用带来了数据量的持续增长,各行各业对算力和网络提出了更为迫切的需求。面对不断倍增的算力和网络需求,算力网络应运而生,然而,分布广、环境复杂、数量庞大的多源算力和网络的融合打破了传统的安全域,算力网络将面临更为严峻的安全和隐私问题。基于算力网络的业务运行机制,较为全面地分析了算力网络在用户接入、算网编排、任务执行、交易结算四个阶段面临的安全风险,并对相关安全技术进行了研究,为算力网络安全技术的研究和应用提供参考。 With the development of the digital economy era,emerging techniques and applications have brought about the continuous growth of data,and all walks of life have put forward urgent demands for computing power and network.In the face of this demand,computing force networks came into being.However,due to the wide distribution,complex environment,and huge quantity,the convergence of multi-source computing force and networks has broken the traditional security domain,which makes computing force networks face more serious security and privacy problems.To this end,based on the service operation mechanism of the computing force network,this paper comprehensively analyzes the security risks of computing force networks in four stages:user access,network scheduling,task execution,and transaction settlement.In addition,the relevant security technologies are investigated,which provides a reference for the application of security technologies in computing force network services.
作者 张逸然 耿慧拯 粟栗 陆黎 杨亭亭 ZHANG Yiran;GENG Huizheng;SU Li;LU li;YANG Tingting(China Mobile Communication Co.,Ltd.Research Institute,Beijing 100053,China)
出处 《移动通信》 2022年第11期90-96,共7页 Mobile Communications
关键词 算力网络 数据安全 隐私保护 算网融合 computing force network data security privacy protection computing and network convergence
  • 相关文献

参考文献13

二级参考文献65

  • 1于清林.从边缘计算到算力网络[J].产业科技创新,2020(3):49-51. 被引量:1
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3田野,张玉军,刘莹,李忠诚.移动IPv6网络基于身份签名的快速认证方法[J].软件学报,2006,17(9):1980-1988. 被引量:12
  • 4宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 5田野,张玉军,张瀚文,李忠诚.移动IPv6网络基于身份的层次化接入认证机制[J].计算机学报,2007,30(6):905-915. 被引量:16
  • 6Kim C, Kim Y S, Huh E N, et al. Performance improvement in mobile IPv6 using AAA and fast handoff[C]//Proceedings of the International Conference on Computational Science and It's Applications ( ICCSA' 04). LNCS 3043. Heidelberg: Springer- Verlag, 2004 : 738-745.
  • 7Gergiades M, Akhtar N, Politis C, et al. AAA context transfer for seamless and secure multimedia services over All IP infrastruetures[C]//Proeeedings of the 5th European Wireless Conference (EW'04). Barcelona,2004:442-448.
  • 8Le F, Patil B, Perkins C E, et al. Diameter mobile IPv6 application. Internet IETF Draft (working in progress).
  • 9Engelstad P, Haslestad T, Paint F. Authenticated access for IPv6 supported mobility[C]//Proceedings of the IEEE International Symposium on Computers and Communication (ISCC'03). Kemer-Antalya, 2003 : 569-575.
  • 10Katz J,Wang N. Efficiency Improvements for Signature Scheme with Tight Security Reductions [C]//ACM-CCS' 2003. Washington, DC, USA: ACM, 2003. 155-164.

共引文献379

同被引文献18

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部