Paper
23 May 2023 Network slice deployment method for cryptographic computing isolation requirements
Miao Wang, Kun Zhao, Lei Sun, Weifei Zang, Shuaichao Song
Author Affiliations +
Proceedings Volume 12645, International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2023); 1264549 (2023) https://doi.org/10.1117/12.2681032
Event: International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2023), 2023, Hangzhou, China
Abstract
In order to enhance the isolation security of 5G cryptographic computing, a network slice deployment method for cryptographic computing isolation was proposed in this paper. Firstly, based on hardware cryptographic virtualization technology, the Network Function Virtualization (NFV) architecture based on cryptographic card virtualization was designed in this paper. By analyzing the characteristics of cryptographic calculation of different Virtual Network Function (VNF) requirement in 5G network slices, the allocation policies of cryptographic resources are set. Then, the deployment method was established as a mixed integer programming model, taking the deployment cost as the objective function, and reducing the deployment cost of network slice by minimizing the objective function. Finally, genetic algorithm is used to simulate the model. Experiments show that the proposed method reduces the deployment cost on the premise of ensuring security.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Miao Wang, Kun Zhao, Lei Sun, Weifei Zang, and Shuaichao Song "Network slice deployment method for cryptographic computing isolation requirements", Proc. SPIE 12645, International Conference on Computer, Artificial Intelligence, and Control Engineering (CAICE 2023), 1264549 (23 May 2023); https://doi.org/10.1117/12.2681032
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Genetic algorithms

Computer security

Computer hardware

Clouds

Network architectures

Information security

Back to Top