CN114531342B - Block chain-based network slice resource transaction system, method and medium - Google Patents

Block chain-based network slice resource transaction system, method and medium Download PDF

Info

Publication number
CN114531342B
CN114531342B CN202011199851.5A CN202011199851A CN114531342B CN 114531342 B CN114531342 B CN 114531342B CN 202011199851 A CN202011199851 A CN 202011199851A CN 114531342 B CN114531342 B CN 114531342B
Authority
CN
China
Prior art keywords
network slice
slice resource
transaction
resources
tenant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011199851.5A
Other languages
Chinese (zh)
Other versions
CN114531342A (en
Inventor
刘小欧
梁伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202011199851.5A priority Critical patent/CN114531342B/en
Publication of CN114531342A publication Critical patent/CN114531342A/en
Application granted granted Critical
Publication of CN114531342B publication Critical patent/CN114531342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5051Service on demand, e.g. definition and deployment of services in real time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a method, a system and a medium for network slice resource transaction based on blockchain. The method comprises the following steps: the infrastructure provider allocates its network slice resources to a plurality of intermediate agents; each intermediate agent and a plurality of tenants registered to the intermediate agent form a network slice resource transaction alliance chain; the intermediate proxy deploys the initial block in the federation chain and loads the network resource registry R therein k ={R 1 ,R 2 ,R 3 ,...,R i -a }; the intermediate agent defines and encodes transaction policies into intelligent contracts, and then issues and enforces the policies to all tenants in the federation chain; each tenant in the network slice resource transaction coalition chain initiates one or more network slice resource requests by invoking intelligent contracts; the intermediate agent uses the current resource state and the received network slice resource request as input of the intelligent contract to execute contract codes so as to verify the validity of the request; and allocating network slice resources to each tenant and writing transaction results into the new block if the verification request is valid.

Description

Block chain-based network slice resource transaction system, method and medium
Technical Field
The invention belongs to the field of blockchains, and particularly relates to a blockchain-based network slice resource transaction system, a blockchain-based network slice resource transaction method and a blockchain-based network slice resource transaction medium.
Background
In a 5G application scenario, a network slice is defined as an instantiation of physical infrastructure or underlying network services and functions. Network slice resource transactions may facilitate dynamic network resource allocation between network resource providers and multi-domain tenants. With the proliferation of 5G times of massive mobile terminals and new application in multiple fields, future wireless network architecture needs to be more flexible and open, and network slice resource transaction requirements are remarkably improved.
The 5G era potential new service participants will promote more network tenants, support vertical industry application by customizing and using network slice resources, but the current centralized network slice resource transaction mode has the problems of difficult transaction condition tracing, poor automation degree, low transaction efficiency, easy leakage of transaction data and the like, and is difficult to meet the dynamic and diversified end-to-end slice transaction requirements of a large number of tenants in a 5G scene.
Therefore, there is a need for an efficient, safe, flexible way to achieve end-to-end on-demand allocation of network resources.
Disclosure of Invention
In view of the above technical problems, the invention provides a network slice resource transaction method and a system based on a blockchain, which are used for realizing end-to-end network slice resource service transaction in a 5G scene based on consensus and intelligent contract technology.
According to one aspect of the present invention, there is provided a blockchain-based network slice resource transaction method, including: the infrastructure provider allocates its network slice resources to a plurality of intermediate agents; each intermediate agent and a plurality of tenants registered to the intermediate agent form a network slice resource transaction alliance chain, wherein each intermediate agent endows each tenant in the plurality of tenants registered to the intermediate agent with a group of public-private key pairs; the intermediate proxy deploys the initial block in the network slice resource transaction alliance chain and loads the network resource registry R therein k ={R 1 ,R 2 ,R 3 ,...,R i (wherein R is) i Reflecting the number of i-type network slice resources in the federation chain; the intermediate agent defines transaction policies and encodes the transaction policies into intelligent contracts, and then issues and enforces the policies to all tenants in the network slice resource transaction alliance chain; each tenant in the network slice resource transaction coalition chain initiates one or more network slice resource requests by invoking intelligent contracts; the intermediate agent uses the current resource state and the received network slice resource request as input of the intelligent contract to execute contract codes so as to verify the validity of the request; and allocating network slice resources to each tenant and writing transaction results into the new block if the verification request is valid.
According to an example embodiment, the method further comprises setting up an ordering node for collecting and ordering network slice resource requests according to arrival times.
According to an example embodiment, the transaction policy comprises a network slice resource allocation policy based on a revenue optimization principle.
According to an example embodiment, the method further comprises recursively tuning the transaction policy by the staging agent by tracking transaction conditions stored by each tile.
According to an example embodiment, each network slice resource request is signed with the public key of the sender tenant and uniquely identified by the sender tenant's ID number.
According to an example embodiment, wherein the one or more network slice resource requests initiated by each tenant are defined as one tupleWherein (1)>Represents the number of i-type network slice resources required,/-for>Is the corresponding bid.
According to an example embodiment, wherein the network slice resource types include radio access network resources, cloud resources, storage network resources, and computing network resources.
According to an example embodiment, where the request j sent for each tenant, the overall benefit that the intermediate proxy obtains by allocating various types of network slice resources is
According to an example embodiment, the network slice resource allocation policy based on the revenue optimization principle employs a network slice resource allocation algorithm based on the revenue optimization principle:
problem intermediate proxy revenue MAX:
wherein x is i,j Indicating whether class i network slice resources are allocated to a request j issued by a tenant.
In another aspect, the present invention provides a blockchain-based network slice resource transaction system, including: an infrastructure provider configured to allocate its network slice resources; a plurality of intermediate agents, each intermediate agent configured to receive network slice resources allocated by an infrastructure provider; and a plurality of tenants, each tenant configured to register with one or more of the plurality of intermediaries, wherein each intermediaries forms with the plurality of tenants registered therewith a network-sliced resource transaction coalition chain, wherein each intermediaries assigns each tenant of the plurality of tenants registered therewith a set of public-private key pairs, wherein the intermediaries deploy an initial block in the network-sliced resource transaction coalition chain and load a network resource registry R therein k ={R 1 ,R 2 ,R 3 ,...,R i -wherein Ri reflects the number of i-type network slice resources in the federation chain, wherein the intermediary agent defines and encodes transaction policies into the intelligent contracts, and then issues and enforces these policies to all tenants in the network slice resource transaction federation chain, wherein each tenant in the network slice resource transaction federation chain initiates one or more network slice resource requests by invoking the intelligent contracts, wherein the intermediary agent executes the contract code using the current resource status and the received network slice resource requests as input to the intelligent contracts to verify request validity, and wherein in case the verification request is valid, the network slice resources are allocated to each tenant and the transaction results are written to the new block.
According to an example embodiment, the system further comprises an ordering node for collecting and ordering network slice resource requests according to arrival times.
According to an example embodiment, the transaction policy comprises a network slice resource allocation policy based on a revenue optimization principle.
According to an example embodiment, the intermediary agent recursively adjusts the transaction policy by tracking transaction instances stored by each tile.
According to an example embodiment, each network slice resource request is signed with the public key of the sender tenant and uniquely identified by the sender tenant's ID number.
According to an example embodiment, wherein the one or more network slice resource requests initiated by each tenant are defined as one tupleWherein (1)>Represents the number of i-type network slice resources required,/-for>Is the corresponding bid.
According to an example embodiment, wherein the network slice resource types include radio access network resources, cloud resources, storage network resources, and computing network resources.
According to an example embodiment, where the request j sent for each tenant, the overall benefit that the intermediate proxy obtains by allocating various types of network slice resources is
According to an example embodiment, the network slice resource allocation policy based on the revenue optimization principle employs a network slice resource allocation algorithm based on the revenue optimization principle:
problem intermediate proxy revenue MAX:
wherein x is i,j Indicating whether class i network slice resources are allocated to a request j issued by a tenant.
According to yet another aspect of the present invention there is provided a non-transitory computer readable medium having instructions stored thereon for execution by a processor to perform the steps of the blockchain-based network slice resource transaction method according to the present invention.
According to a further aspect of the present invention there is provided a blockchain-based network slice resource transaction device comprising means for performing the steps of the blockchain-based network slice resource transaction method of the present invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
For a better understanding of the present disclosure, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings in which:
FIG. 1 illustrates a block diagram of an electronic device for implementing blockchain-based network slice resource transactions in accordance with embodiments of the present disclosure;
FIG. 2 illustrates an exemplary architecture diagram of a blockchain-based network slice resource transaction system in accordance with embodiments of the present disclosure;
FIG. 3 illustrates an exemplary block diagram of a network slice transaction coalition chain according to an embodiment of the present disclosure;
FIG. 4 illustrates an exemplary block diagram of a network slice transaction coalition chain ledger according to an embodiment of the disclosure;
5A-5B illustrate exemplary message structure diagrams of tenant-initiated network slice resource requests and responses in accordance with an embodiment of the present invention;
fig. 6 illustrates a flowchart of a blockchain-based network slice resource transaction method in accordance with embodiments of the present disclosure.
Note that like reference numerals refer to corresponding parts throughout the drawings.
Detailed Description
The following detailed description is made with reference to the accompanying drawings and is provided to assist in a comprehensive understanding of various example embodiments of the disclosure. The following description includes various details to aid in understanding, but these are to be considered merely examples and are not intended to limit the disclosure, which is defined by the appended claims and their equivalents. The words and phrases used in the following description are only intended to provide a clear and consistent understanding of the present disclosure. In addition, descriptions of well-known structures, functions and configurations may be omitted for clarity and conciseness. Those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the spirit and scope of the present disclosure.
Fig. 1 is an exemplary configuration block diagram illustrating an electronic device 100 according to an embodiment of the present disclosure. The electronic device 100 may be used to implement a blockchain-based network slice resource transaction arrangement in accordance with the present invention.
As shown in fig. 1, the electronic device 100 includes a user interface 20, a network interface 21, a power supply 22, an external network interface 23, a memory 24, and a processor 26. The user interface 20 may include, but is not limited to, buttons, a keyboard, a keypad, LCD, CRT, TFT, LED, HD, or other similar display devices, including display devices having touch screen capabilities to enable interaction between a user and a gateway device. In some embodiments, the user interface 20 may be used to present a Graphical User Interface (GUI) to receive user input.
The network interface 21 may include various network cards and circuitry implemented in software and/or hardware to enable communication with user equipment using wired or wireless protocols. The wired communication protocol is, for example, any one or more of an ethernet protocol, a MoCA specification protocol, a USB protocol, or other wired communication protocol. The wireless protocol is, for example, any IEEE 802.11 Wi-Fi protocol, bluetooth Low Energy (BLE), or other short range protocol operating in accordance with wireless technology standards for exchanging data over short distances using any licensed or unlicensed frequency band, such as the Citizen Broadband Radio Services (CBRS) band, 2.4GHz band, 5GHz band, 6GHz band, or 60GHz band, RF4CE protocol, zigBee protocol, Z-Wave protocol, or IEEE 802.15.4 protocol. Where the network interface 21 uses a wireless protocol, in some embodiments the network interface 21 may also include one or more antennas (not shown) or circuit nodes for coupling to the one or more antennas. The electronic device 100 may provide an internal network to the user device through the network interface 21.
The power supply 22 provides power to the internal components of the electronic device 100 via the internal bus 27. The power source 22 may be a self-contained power source, such as a battery pack, that interfaces with a charger that is connected to a socket (e.g., directly or through other devices). The power supply 22 may also include a removable, replaceable rechargeable battery, such as a NiCd, niMH, li-ion or Li-pol battery. The external network interface 23 may include various network cards and circuitry implemented in software and/or hardware to enable communication between the electronic device 100 and a provider of an external network, such as an internet service provider or a Multiple System Operator (MSO).
Memory 24 includes a single memory or one or more memories or storage locations including, but not limited to, random Access Memory (RAM), dynamic Random Access Memory (DRAM), static Random Access Memory (SRAM), read Only Memory (ROM), EPROM, EEPROM, flash memory, logic blocks of an FPGA, a hard disk, or any other layer of a memory hierarchy. Memory 24 may be used to store any type of instructions, software, or algorithms, including software 25 for controlling the general functions and operations of electronic device 100.
The processor 26 controls the general operation of the electronic device 100 and performs management functions related to other devices in the network, such as user devices. The processor 26 may include, but is not limited to, a CPU, a hardware microprocessor, a hardware processor, a multi-core processor, a single-core processor, a microcontroller, an Application Specific Integrated Circuit (ASIC), a DSP, or other similar processing device capable of executing any type of instructions, algorithms, or software for controlling the operation and functions of the electronic device 100 in accordance with embodiments described in this disclosure. Processor 26 may be various implementations of digital circuitry, analog circuitry, or mixed signal (a combination of analog and digital) circuitry that performs functions in a computing system. Processor 26 may include, for example, a portion or circuit such as an Integrated Circuit (IC), an individual processor core, an entire processor core, an individual processor, a programmable hardware device such as a Field Programmable Gate Array (FPGA), and/or a system including multiple processors.
Internal bus 27 may be used to establish communications between components (e.g., 20-22, 24, and 26) of electronic device 100.
Although specific components are used to describe electronic device 100, in alternative embodiments, different components may be present in electronic device 100. For example, the electronic device 100 may include one or more additional controllers, memory, network interfaces, external network interfaces, and/or user interfaces. In addition, one or more of the components may not be present in the electronic device 100. Further, in some embodiments, the electronic device 100 may include one or more components not shown in fig. 1. Additionally, although separate components are shown in fig. 1, in some embodiments, some or all of a given component may be integrated into one or more of the other components in electronic device 100. Further, any combination of analog and/or digital circuits may be used to implement the circuits and components in electronic device 100.
Fig. 2 illustrates an exemplary architecture diagram 200 of a blockchain-based network slice resource transaction system in accordance with embodiments of the present invention. As shown in fig. 2, the blockchain-based network slice resource transaction system includes an infrastructure provider, a plurality of intermediary agent modules, and a plurality of tenant modules. The infrastructure provider may allocate its network slice resources to a plurality of staging agents. Each of the plurality of intermediate agents is denoted b k ,B={b 1 ,b 2 ,b 3 ,...,b k }. In intermediate agent b k The tenant through which the process is registered may be denoted as T k ={T 1 ,T 2 ,T 3 ,...,T t Total t tenants. The intermediate agent gives each registered tenant a set of public-private key pairs { K } priv ,K pub }。
Each intermediate agent b k And a plurality of tenants registered in the network slice resource transaction alliance chain is formed as peer nodes, dynamic resource exchange can be realized among a plurality of tenants in the same alliance chain, and each tenant can participate in different alliance chains. Fig. 3 shows a schematic diagram of the architecture of a network slice resource transaction coalition chain. In a network slice resource transaction alliance chain, an intermediate agent bk deploys an initial block and loads a network resource registry R therein k ={R 1 ,R 2 ,R 3 ,...,R i To avoid overstock of network slice resources, where Ri reflects the number of i-type resources in the federation chain. According to an example embodiment, the types of network slice resources herein may include radio joining network (RAN) resources, cloud resources, storage resources, computing resources, and the like.
Intermediate agent b k Transaction policies are defined in the initial block and encoded into the intelligent contracts, and then issued and enforced to all tenants in the federation chain. Each tenant in the federation chain initiates a network slice resource request by invoking an intelligent contract. The tenant initiated network slice resource request includes a purchase network slice resource request and a release network slice resource request. Each network slice resource request initiated by a tenant is signed by using the public key of the sender tenant, and is uniquely identified by the ID number of the initiator tenant. Fig. 4 shows a schematic diagram of the structure of a network slice transaction association chain ledger, which is described in detail below with reference to fig. 5A-5B.
Fig. 5A-5B are message structure diagrams illustrating tenant initiated network slice resource requests and responses, respectively. As shown in fig. 5A, tenant T k As the request initiator, the contents of the request message include a timestamp, tenant public key, type of transaction requested (e.g., whether to purchase or release network slice resources, what type of resource is, etc.), tenant ID, number of resources requested toAnd metadata. As shown in fig. 5B, tenant T k As a responder to the request, the contents of the response message include a timestamp, a tenant public key, a type of transaction requested, a tenant ID, a response result, and metadata. According to one embodiment, the response result may include a releasable amount of network slice resources.
The network slice resource transaction system also comprises a sequencing node, and the network slice resource requests received by the intermediate node are collected and sequenced according to the arrival time. The ordering nodes typically do not participate in the authentication process, but they allow the ordering and authentication functions to be decoupled (i.e., ordered only and not authenticated) and processed in parallel (i.e., allowing ordering and authentication functions to be performed simultaneously), thereby improving the efficiency of the overall system.
The intermediary agent module executes the smart contract code using the current resource status and the received network slice resource request as input parameters for the smart contract to verify the validity of the request. According to one embodiment, in case the received request is in the correct format, the requested resource type exists and the resource is available, the request is considered valid, whereupon the intermediary agent allocates the resource of this type to the requesting tenant, while writing the transaction result of the network slice resource to the new block.
In addition, the intermediate agent can customize a proper consensus algorithm (such as a practical Bayesian algorithm (PBFT)) in the alliance chain according to the service requirement so as to improve the resource transaction efficiency.
According to a preferred embodiment of the invention, the intermediate agent b k And defining a network slice resource allocation strategy based on a profit optimization principle in the initial block. The specific algorithm is described as follows:
the tenant T initiated network slice resource request may be defined as a tuple
Wherein->Representing the type of i requiredThe number of network slice resources, +.>Is the corresponding bid. As previously mentioned, the network slice resource types herein may include various types of Radio Access Network (RAN) resources, cloud resources, storage resources, computing resources, and the like.
Each tenant T may issue multiple purchase slice requests, and the staging agent may collect all purchase slice requests ψ within the federation chain j . Specifying x i,j A decision variable indicating whether to allocate class i network slice resources to a request j issued by tenant T. The end-to-end network slice transaction is successful if all types of network slice resources can be allocated according to the request of the tenant in one request.
Representing the total revenue that the staging agent can obtain by allocating the various types of sliced resources for request j sent by tenant T. The network slice resource allocation algorithm based on the profit optimization principle comprises the following steps:
problem intermediate proxy revenue MAX:
according to the embodiment of the invention, the intermediate agent can track the transaction condition stored in the block and recursively adjust the strategy.
Fig. 6 illustrates an exemplary flowchart 600 of a blockchain-based network slice resource transaction method in accordance with embodiments of the present invention. The network slice resource transaction method shown in fig. 6 may be performed by the blockchain-based network slice resource transaction method system shown in fig. 2.
As shown in fig. 6, in step S610, the infrastructure provider allocates its network slice resources to the plurality of intermediate agents b k . At step S620, each intermediate agent is networked with a plurality of tenants registered therewithA chain of linked resource transaction associations. According to an embodiment of the present invention, each intermediate agent assigns each tenant of the plurality of tenants registered therewith a set of public-private key pairs { K } priv ,K pub }。
In step S630, the intermediate agent deploys the initial block in the network slice resource transaction coalition chain and loads the network resource registry R therein k ={R 1 ,R 2 ,R 3 ,...,R i }. Where R is i Reflecting the number of i-type network slice resources in the federation chain, as previously described, the types of network slice resources herein may include radio joining network (RAN) resources, cloud resources, storage resources, computing resources, and the like.
In step S640, the staging agent defines and encodes the transaction policies into intelligent contracts, and then publishes and enforces these policies to all tenants in the network slice resource transaction federation chain. According to a preferred embodiment of the present invention, the transaction policy comprises a network slice resource allocation policy based on a revenue optimization principle, wherein one or more network slice resource requests initiated by each tenant are defined as one tupleWherein,represents the number of i-type network slice resources required,/-for>Is a corresponding bid, wherein for each tenant transmitted request j, the total gain obtained by the intermediary agent by allocating various types of network slice resources is +.>The network slice resource allocation strategy based on the profit optimization principle adopts a network slice resource allocation algorithm based on the profit optimization principle:
problem intermediate proxy revenue MAX:
wherein x is i,j Indicating whether class i network slice resources are allocated to a request j issued by a tenant.
At step S650, each tenant in the network slice resource transaction federation chain initiates one or more network slice resource requests by invoking an intelligent contract. As previously described, one or more network slice resource requests initiated by individual tenants by invoking the intelligent contract may be either a purchase network slice resource request, a release network slice resource request, or a combination of both. According to an exemplary embodiment, each network slice resource request is signed with the public key of the sender tenant and uniquely identified by the sender tenant's ID number.
As previously described, according to one embodiment, a request is verified as valid if the received request is properly formatted, and the requested resource type is present and available.
In step S670, network slice resources are allocated to each tenant and the transaction result is written into the new block if the authentication request is valid.
According to additional embodiments, the method 600 may further comprise setting up ordering nodes for collecting and ordering network slice resource requests according to arrival times.
According to additional embodiments, the method 600 may further include the intermediary agent recursively tuning the transaction policy by tracking transaction conditions stored by each block.
On one hand, the invention improves the expandability of the scheme by introducing the intermediate agent and designing the network slice resource transaction alliance chain consisting of the intermediate agent and the tenant to strip the slice transaction management from the resource provider. On the other hand, the invention introduces the ordering nodes, the intermediate agent can efficiently manage mass tenant requests, and the intermediate agent tracks and monitors the transaction conditions stored in the alliance chain block, so that the resources can be managed to avoid over allocation. In addition, by designing the network slice resource allocation strategy based on the profit optimization principle, the invention can implement slice resource transaction when all types of slice resources can be allocated according to the request of tenants and the total profit obtained by allocating each type of slice resources by the intermediate agent is maximum, and the intermediate agent can also recursively optimize the strategy based on the transaction result so as to meet the demands of most transaction scenes.
The system and the method provided by the invention can be directly applied to the 5G network resource co-building sharing scene of China telecom, and the intermediate agency can be acted by a blockchain platform development team or a blockchain service provider to realize the business scenes of network slice resource matching, resource leasing, resource settlement and the like in the 5G co-building sharing. Furthermore, the system and the method provided by the invention can be applied to China telecom to facilitate a 5G and blockchain fusion solution and promote the construction of novel information infrastructures. The scheme is a universal method, and the intermediate agent and the alliance chain design architecture, the end-to-end network slicing transaction method and the strategy based on the blockchain can be directly used.
The present disclosure may be implemented as any combination of apparatuses, systems, integrated circuits, and computer programs on a non-transitory computer readable medium. One or more controllers may be implemented as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), or a large scale integrated circuit (LSI), a system LSI, a super LSI, or a super LSI assembly that performs some or all of the functions described in this disclosure.
The present disclosure includes the use of software, applications, computer programs, or algorithms. The software, application, computer program or algorithm may be stored on a non-transitory computer readable medium to cause a computer, such as one or more processors, to perform the steps described above and depicted in the drawings. For example, the one or more memories store software or algorithms in executable instructions and the one or more processors may associate a set of instructions to execute the software or algorithms to provide network configuration information management functions of the network access device in accordance with embodiments described in the present disclosure.
The software and computer programs (which may also be referred to as programs, software applications, components, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural, object-oriented, functional, logical, or assembly or machine language. The term "computer-readable medium" refers to any computer program product, apparatus or device, such as magnetic disks, optical disks, solid state memory devices, memory, and Programmable Logic Devices (PLDs), for providing machine instructions or data to a programmable data processor, including computer-readable media that receives machine instructions as a computer-readable signal.
By way of example, computer-readable media can comprise Dynamic Random Access Memory (DRAM), random Access Memory (RAM), read Only Memory (ROM), electrically erasable read only memory (EEPROM), compact disk read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired computer-readable program code in the form of instructions or data structures and that can be accessed by a general purpose or special purpose computer or general purpose or special purpose processor. Disk or disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
In addition, the foregoing description provides examples without limiting the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various embodiments may omit, replace, or add various procedures or components as appropriate. For example, features described with respect to certain embodiments may be combined in other embodiments.

Claims (20)

1. A blockchain-based network slice resource transaction method, comprising:
the infrastructure provider allocates its network slice resources to a plurality of intermediate agents;
each intermediate agent and a plurality of tenants registered to the intermediate agent form a network slice resource transaction alliance chain, wherein each intermediate agent endows each tenant in the plurality of tenants registered to the intermediate agent with a group of public-private key pairs;
the intermediate proxy deploys the initial block in the network slice resource transaction alliance chain and loads the network resource registry R therein k ={R 1 ,R 2 ,R 3 ,…,R i (wherein R is) i Reflecting the number of i-type network slice resources in the federation chain;
the intermediate agent defines transaction policies and encodes the transaction policies into intelligent contracts, and then issues and enforces the policies to all tenants in the network slice resource transaction alliance chain;
each tenant in the network slice resource transaction coalition chain initiates one or more network slice resource requests by invoking intelligent contracts;
the intermediate agent uses the current resource state and the received network slice resource request as input of the intelligent contract to execute contract codes so as to verify the validity of the request; and
and allocating network slice resources to each tenant and writing transaction results into the new block under the condition that the verification request is valid.
2. The network slice resource transaction method of claim 1, further comprising:
the ordering node is arranged for collecting and ordering network slice resource requests according to arrival times.
3. The network slice resource trading method of claim 1, wherein the trading strategy comprises a network slice resource allocation strategy based on a revenue optimization principle.
4. The network slice resource transaction method of claim 3, further comprising:
the intermediate agent recursively adjusts the transaction strategy by tracking transaction conditions stored in each block.
5. The network slice resource transaction method of claim 1, wherein each network slice resource request is signed with a public key of the sender tenant and uniquely identified by an ID number of the sender tenant.
6. A network slice resource transaction method according to claim 3, wherein one or more network slice resource requests initiated by each tenant T are defined as a tupleWherein,representing the number of i-type network slice resources required by tenant T,/>Is the corresponding bid.
7. The network slice resource transaction method of claim 6, wherein the network slice resource types include wireless access network resources, cloud resources, storage network resources, and computing network resources.
8. The network slice resource transaction method according to claim 7, wherein the total benefit obtained by the intermediary agent by allocating various types of network slice resources for the request j transmitted by each tenant T isWherein (1)>Representing tenant TsendBid corresponding to i type network slice resource required by request j to be sent, +.>Represents the sum of i as a variable, p->Summing is performed.
9. The network slice resource trading method of claim 8, wherein the network slice resource allocation policy based on the revenue optimization principle employs a network slice resource allocation algorithm based on the revenue optimization principle:
problem intermediate proxy revenue MAX:
x i,j ∈{0,1};
wherein x is i,j Indicating whether class i network slice resources are allocated to a request j issued by a tenant,representing the number of i-type network slice resources required for request j sent by tenant T, Γ represents the set of types of network slice resources.
10. A blockchain-based network slice resource transaction system, comprising:
an infrastructure provider configured to allocate its network slice resources;
a plurality of intermediate agents, each intermediate agent configured to receive network slice resources allocated by an infrastructure provider; and
a plurality of tenants, each configured to register with one or more of the plurality of intermediate agents,
wherein each intermediate agent forms a network slice resource transaction federation chain with a plurality of tenants registered therewith, wherein each intermediate agent assigns a set of public-private key pairs to each of the plurality of tenants registered therewith,
wherein the intermediate agent deploys an initial block in the network slice resource transaction alliance chain and loads the network resource registry R therein k ={R 1 ,R 2 ,R 3 ,…,R i (wherein R is) i Reflecting the number of i-type network slice resources in the federation chain,
wherein the intermediary agent defines and encodes the transaction policies into intelligent contracts, and then issues and enforces these policies to all tenants in the network slice resource transaction federation chain,
wherein each tenant in the network slice resource transaction federation chain initiates one or more network slice resource requests by invoking an intelligent contract;
wherein the intermediary agent executes the contract code using the current resource status and the received network slice resource request as input to the intelligent contract to verify the request validity; and
wherein network slice resources are allocated to each tenant and transaction results are written to the new block if the validation request is valid.
11. The network slice resource transaction system of claim 10, further comprising:
the ordering node is configured to collect and order network slice resource requests based on arrival times.
12. The network slice resource trading system of claim 10, wherein the trading strategy comprises a network slice resource allocation strategy based on a revenue optimization principle.
13. The network slice resource transaction system of claim 12 wherein the staging agent recursively adjusts the transaction policies by tracking transaction conditions stored by each block.
14. The network slice resource transaction system of claim 10, wherein each network slice resource request is signed with the public key of the sender tenant and uniquely identified by the sender tenant's ID number.
15. The network slice resource transaction system of claim 12, wherein one or more network slice resource requests initiated by each tenant T are defined as a tupleWherein (1)>Representing the number of i-type network slice resources required by tenant T,/>Is the corresponding bid.
16. The network slice resource transaction system of claim 15, wherein the network slice resource types comprise wireless access network resources, cloud resources, storage network resources, and computing network resources.
17. The network slice resource transaction system of claim 16, wherein the total benefit obtained by the intermediary agent by allocating various types of network slice resources for each tenant T-transmitted request j isWherein,i-type network required for representing request j sent by tenant TBid corresponding to slice resource,/->Represents the sum of i as a variable, p->Summing is performed.
18. The network slice resource transaction system of claim 17, wherein the revenue optimization principle-based network slice resource allocation policy employs a revenue optimization principle-based network slice resource allocation algorithm:
problem intermediate proxy revenue MAX:
x i,j ∈{0,1};
wherein x is i,j Indicating whether class i network slice resources are allocated to a request j issued by a tenant,representing the number of i-type network slice resources required for request j sent by tenant T, Γ represents the set of types of network slice resources.
19. A non-transitory computer readable medium having instructions stored thereon for execution by a processor to perform the steps of the method according to any of claims 1-9.
20. A blockchain-based network slice resource transaction device comprising means for performing the steps of the method of any of claims 1-9.
CN202011199851.5A 2020-10-30 2020-10-30 Block chain-based network slice resource transaction system, method and medium Active CN114531342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011199851.5A CN114531342B (en) 2020-10-30 2020-10-30 Block chain-based network slice resource transaction system, method and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011199851.5A CN114531342B (en) 2020-10-30 2020-10-30 Block chain-based network slice resource transaction system, method and medium

Publications (2)

Publication Number Publication Date
CN114531342A CN114531342A (en) 2022-05-24
CN114531342B true CN114531342B (en) 2024-04-09

Family

ID=81618695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011199851.5A Active CN114531342B (en) 2020-10-30 2020-10-30 Block chain-based network slice resource transaction system, method and medium

Country Status (1)

Country Link
CN (1) CN114531342B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600798A (en) * 2018-11-15 2019-04-09 北京邮电大学 Multi-domain resource allocation method and device in a kind of network slice
WO2019102191A1 (en) * 2017-11-24 2019-05-31 Zeetta Networks Limited A system for providing an end-to-end network
CN110662231A (en) * 2019-09-25 2020-01-07 南京优速网络科技有限公司 Network slice resource adjusting method and system for 5G environment
CN110708188A (en) * 2019-09-19 2020-01-17 中国联合网络通信集团有限公司 Method and device for creating network slice based on SLA
CN110881199A (en) * 2019-12-06 2020-03-13 国网河南省电力公司许昌供电公司 Dynamic allocation method, device and system for network slice resources
CN111277437A (en) * 2020-01-17 2020-06-12 全球能源互联网研究院有限公司 Network slice resource allocation method for smart power grid

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019102191A1 (en) * 2017-11-24 2019-05-31 Zeetta Networks Limited A system for providing an end-to-end network
CN109600798A (en) * 2018-11-15 2019-04-09 北京邮电大学 Multi-domain resource allocation method and device in a kind of network slice
CN110708188A (en) * 2019-09-19 2020-01-17 中国联合网络通信集团有限公司 Method and device for creating network slice based on SLA
CN110662231A (en) * 2019-09-25 2020-01-07 南京优速网络科技有限公司 Network slice resource adjusting method and system for 5G environment
CN110881199A (en) * 2019-12-06 2020-03-13 国网河南省电力公司许昌供电公司 Dynamic allocation method, device and system for network slice resources
CN111277437A (en) * 2020-01-17 2020-06-12 全球能源互联网研究院有限公司 Network slice resource allocation method for smart power grid

Also Published As

Publication number Publication date
CN114531342A (en) 2022-05-24

Similar Documents

Publication Publication Date Title
US11916730B2 (en) Service provision to IoT devices
US11836721B2 (en) Protection of information in an information exchange
Sadatdiynov et al. A review of optimization methods for computation offloading in edge computing networks
JP7334743B2 (en) Electronic equipment and spectrum management method
CN105024865B (en) Cloud joint services
US20200366493A1 (en) Distributed self sovereign identities for network function virtualization
Barmouta et al. Gridbank: A grid accounting services architecture (gasa) for distributed systems sharing and integration
Wang et al. Blockchain-based IoT device identification and management in 5G smart grid
TW202038173A (en) Blockchain-based data processing system and method, computing device and storage medium
CN109636492A (en) Tax administration method, apparatus, medium and electronic equipment based on block catenary system
US11218313B1 (en) Decentralized verification of devices using distributed ledger technology
CN114026834A (en) Multi-entity resource, security, and service management in edge computing deployments
TW202024943A (en) Multi-access edge computing node with distributed ledger
CN112000976B (en) Authentication management method, device, medium and electronic equipment for block chain system
CN113657900B (en) Cross-chain transaction verification method and system and cross-chain transaction system
US8613043B2 (en) Identity mediation in enterprise service bus
JP2020088848A (en) Method and apparatus for managing enrollment certificate in security credential management system for v2x communication by relaying between eca and dcm
US11238448B1 (en) Efficient network service provisioning
CN112291305B (en) Code chain construction method and device based on unified identification
Gupta et al. Energy-aware demand selection and allocation for real-time IoT data trading
Merizig et al. A multi-agent system approach for service deployment in the cloud
US11720900B1 (en) Systems and methods for adaptive learning to replicate peak performance of human decision making
Ullah et al. Smart grid block-chain (BC) conceptual framework: Bi-directional models for renewable energy district and utility
CN114531342B (en) Block chain-based network slice resource transaction system, method and medium
KR20220071241A (en) Computer-implemented systems and methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant