Workflow
Computing Power Internet Security
icon
Search documents
算力互联网安全风险与防范
Sou Hu Cai Jing· 2025-10-04 09:05
Core Viewpoint - The integration of cloud computing and intelligent computing is reshaping the underlying logic of the digital economy, with a focus on the need for on-demand access to computing resources driven by advancements in artificial intelligence technology [1][2]. Group 1: Policy Framework and Development - The policy framework for the computing power industry is gradually improving, with numerous institutional documents being released to solidify the foundation for high-quality and large-scale development [2]. - The "Action Plan for High-Quality Development of Computing Power Infrastructure" aims to establish a unified system for computing resource identification and authentication, while enhancing security capabilities [2][12]. - The Ministry of Industry and Information Technology issued the "Action Plan for Computing Power Interconnection," emphasizing the need for a secure computing power internet and integrated security capabilities across cloud, network, edge, and terminal [2][12]. Group 2: Security Challenges in Computing Power Internet - The computing power internet is a new network technology system designed for compute-intensive tasks and dynamic scheduling, requiring a unified identification mechanism and standardized protocol interfaces [3]. - The current security system of the computing power internet is still immature, facing risks such as resource hijacking, denial of service, network channel attacks, and model poisoning [3][4]. - The complexity of the computing power interconnection system necessitates urgent and systematic risk prevention and governance measures [3]. Group 3: Infrastructure and Technical Risks - The security risks at the computing power infrastructure layer stem from technological heterogeneity and weak interconnection mechanisms, leading to compatibility issues and immature security systems [4][5]. - The complexity of computing resource architecture, including heterogeneous chips, complicates compatibility and increases vulnerability to attacks [5]. - The core interconnection system lacks a unified identification system, making it difficult to prevent risks such as forgery and tampering [5][6]. Group 4: Resource Interconnection and Management Challenges - Security challenges at the resource interconnection layer include difficulties in identity management and insufficient trust in scheduling [6][8]. - The complexity of managing identities and permissions on large resource scheduling platforms increases the risk of unauthorized access and cross-domain attacks [6][8]. Group 5: Application Layer Stability and Data Security - Ensuring the stability and low-latency response of computing power application services is challenging, particularly during surges in demand or node failures [10]. - The division of data security responsibilities among multiple stakeholders, including users, service providers, and regulatory bodies, complicates accountability and increases risks of data breaches [10][12]. Group 6: Building a Secure and Trustworthy System - The construction of a trustworthy computing power internet system is essential for addressing non-traditional security challenges and promoting high-quality digital economic development [12]. - Measures include developing a domestic computing card ecosystem, establishing unified identification systems, and enhancing network transmission technologies [12].