CPN中多租户与计算路由节点之间的安全映射方法

Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie
{"title":"CPN中多租户与计算路由节点之间的安全映射方法","authors":"Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie","doi":"10.1145/3600061.3603121","DOIUrl":null,"url":null,"abstract":"Computing power network (CPN) has been proposed to allocate and schedule computing power resources among cloud, network, and edge according to the needs of computing services. CPN can improve the utilization rate of various computing resource pools. However, it brings another challenge that how to ensure the security of multi-tenant information and the resource information which they rent. To solve this problem, we propose an isolation architecture in CPN, add a tenant mapping management module in network control layer firstly. Then we design the security mapping process between the tenant and the computing routing node based on this architecture. At last, we propose a mapping method between tenants and computing routing nodes based on hash ring which can avoid the problem of data migration caused by increasing the number of computing routing nodes. In the future, we will study the mapping algorithm to improve the efficiency of CPN.","PeriodicalId":228934,"journal":{"name":"Proceedings of the 7th Asia-Pacific Workshop on Networking","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Security Mapping Approach between Multi Tenant and Computing Routing Nodes in CPN\",\"authors\":\"Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie\",\"doi\":\"10.1145/3600061.3603121\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computing power network (CPN) has been proposed to allocate and schedule computing power resources among cloud, network, and edge according to the needs of computing services. CPN can improve the utilization rate of various computing resource pools. However, it brings another challenge that how to ensure the security of multi-tenant information and the resource information which they rent. To solve this problem, we propose an isolation architecture in CPN, add a tenant mapping management module in network control layer firstly. Then we design the security mapping process between the tenant and the computing routing node based on this architecture. At last, we propose a mapping method between tenants and computing routing nodes based on hash ring which can avoid the problem of data migration caused by increasing the number of computing routing nodes. In the future, we will study the mapping algorithm to improve the efficiency of CPN.\",\"PeriodicalId\":228934,\"journal\":{\"name\":\"Proceedings of the 7th Asia-Pacific Workshop on Networking\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th Asia-Pacific Workshop on Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3600061.3603121\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th Asia-Pacific Workshop on Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3600061.3603121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

计算能力网络(CPN)是根据计算业务的需要,在云、网络和边缘之间对计算能力资源进行分配和调度的概念。CPN可以提高各种计算资源池的利用率。然而,如何保证多租户信息及其所租用的资源信息的安全性,又是一个挑战。为了解决这个问题,我们提出了一种CPN隔离架构,首先在网络控制层增加租户映射管理模块。然后在此基础上设计了租户与计算路由节点之间的安全映射过程。最后,我们提出了一种基于哈希环的租户与计算路由节点之间的映射方法,可以避免由于计算路由节点数量的增加而导致的数据迁移问题。在未来,我们将研究映射算法来提高CPN的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Security Mapping Approach between Multi Tenant and Computing Routing Nodes in CPN
Computing power network (CPN) has been proposed to allocate and schedule computing power resources among cloud, network, and edge according to the needs of computing services. CPN can improve the utilization rate of various computing resource pools. However, it brings another challenge that how to ensure the security of multi-tenant information and the resource information which they rent. To solve this problem, we propose an isolation architecture in CPN, add a tenant mapping management module in network control layer firstly. Then we design the security mapping process between the tenant and the computing routing node based on this architecture. At last, we propose a mapping method between tenants and computing routing nodes based on hash ring which can avoid the problem of data migration caused by increasing the number of computing routing nodes. In the future, we will study the mapping algorithm to improve the efficiency of CPN.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信