Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2022-2024] : [SG11] : [Q4/11]

[Declared patent(s)]  - [Associated work]

Work item: Q.cco-mec
Subject/title: Signalling requirements for orchestration supporting confidential computing in multi-access edge computing
Status: Under study 
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: 2025-03 (Medium priority)
Liaison: ITU-T SG13 SG16 SG17, ETSI ISG MEC
Supporting members: China Unicom, China Telecom, BUPT
Summary: The digital transformation of the vertical industries leads to the enhancement of the collaboration between the enterprise internal and external constituents and between the industry ecosystems. Data fuels digital business, and the demand for trusted data cooperation and federated collaboration with external sources continues rising. In addition, the deployment of IMT-2020 has also greatly advanced the digital transformation process of vertical industries. The IMT-2020 is changing the way the vertical industry data is collected and processed. More and more vertical industry data storage and data processing are carried on the multi-access edge computing, e.g. distributed AI training, joint modelling and multi-party computation. However, enterprises are reluctant to share their own data because of fearing to lose control over the data, even with legal agreements. Meanwhile, the 3rd party algorithm providers also fear the algorithm model leak or usage for unauthorized purposes in the data coordination. Thus, a neutral and trusted outsourcing environment which can protect the data and algorithm model is required. The confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Leveraging the TEE-based confidential computing, the stakeholders could outsource the trusted computation tasks in the TEE that resides within processor to protect the data and algorithm model. The multi-access edge computing still cannot provide the orchestration for supporting confidential computing. The signalling of the orchestration supporting confidential computing in multi-access edge computing needs to consider providing but not limited: 1) the hardware-based TEE enabling information registration; 2) the confidential computing resource orchestration, e.g. the template description and the specific TEE affinity; 3) the remote attestation and interworking of the hardware-based TEE for the applications. Therefore, it is necessary for the multi-access edge computing architecture to support signalling requirements and enhanced interfaces to fulfil the orchestration to support the feature of confidential computing.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Huan Deng, Editor
Yueming Lu, Editor
Jie Ren, Editor
Miao Xue, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2022-12-14 15:32:25
Last update: 2024-02-09 15:04:03