{"title":"A Security Mapping Approach between Multi Tenant and Computing Routing Nodes in CPN","authors":"Jiacong Li, Hang Lv, Bo Lei, Yunpeng Xie","doi":"10.1145/3600061.3603121","DOIUrl":null,"url":null,"abstract":"Computing power network (CPN) has been proposed to allocate and schedule computing power resources among cloud, network, and edge according to the needs of computing services. CPN can improve the utilization rate of various computing resource pools. However, it brings another challenge that how to ensure the security of multi-tenant information and the resource information which they rent. To solve this problem, we propose an isolation architecture in CPN, add a tenant mapping management module in network control layer firstly. Then we design the security mapping process between the tenant and the computing routing node based on this architecture. At last, we propose a mapping method between tenants and computing routing nodes based on hash ring which can avoid the problem of data migration caused by increasing the number of computing routing nodes. In the future, we will study the mapping algorithm to improve the efficiency of CPN.","PeriodicalId":228934,"journal":{"name":"Proceedings of the 7th Asia-Pacific Workshop on Networking","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th Asia-Pacific Workshop on Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3600061.3603121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Computing power network (CPN) has been proposed to allocate and schedule computing power resources among cloud, network, and edge according to the needs of computing services. CPN can improve the utilization rate of various computing resource pools. However, it brings another challenge that how to ensure the security of multi-tenant information and the resource information which they rent. To solve this problem, we propose an isolation architecture in CPN, add a tenant mapping management module in network control layer firstly. Then we design the security mapping process between the tenant and the computing routing node based on this architecture. At last, we propose a mapping method between tenants and computing routing nodes based on hash ring which can avoid the problem of data migration caused by increasing the number of computing routing nodes. In the future, we will study the mapping algorithm to improve the efficiency of CPN.