This page will soon be deactivated—explore our new, faster, mobile-friendly site, now centralized in MyWorkspace!

Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

[2022-2024] : [SG17] : [Q2/17]

[Declared patent(s)]

Work item: TR.sec-int-cpc
Subject/title: Technical report: Security considerations for interconnection of computing power centers
Status: [Carried to next study period]
Approval process: Agreement
Type of work item: Technical report
Version: New
Equivalent number: -
Timing: -
Liaison: ITU-T SG 2, ITU-T SG 11, ITU-T SG 13, IETF CATS
Supporting members: China Telecom, China Mobile, China Unicom, ZTE, Beijing University of Post and Telecommunications
Summary: To provide ubuiqitos computing service, a key pre-requisite is to interconnet the distributed computing resources, especially the large-scale computing power centers. One of the major characterstics and functionalities of CPN is to interconnect distributed computing power centers, so as to provide seemless services to numerous resource-demanding applications. In this case, the interconnection of computing power centers involves uniquitous computing power resources, and introduces a management and orchestration platform to achieve optimal resource allocation. However, there still exists numerous security issues of interconnection of computing power centers to address, such as high-through secure data transmission, secure computing resource management and orchestration, communication protocol security, etc. Recently, there are numerous study and work items been initiated in several different standardization development organizations, such as ITU-T, IETF, and 3GPP. However, there lacks a comprehensive high-level analysis on the security aspects on the interconnection of computing power centers, such as the general security objectives, the security risks it faces, and security guidelines. This draft technical report focuses on the security aspects of the interconnection of computing power centers, and analyses the general security objectives and security risks.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Yu JIANG, Editor
Xiang LIU, Editor
Weizhe ZHANG, Editor
Yu ZHANG, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2024-03-11 13:15:14
Last update: 2024-09-18 11:12:43