Towards Prompt Chain Deployment in Zero Trust-enabled Compute First Networks

Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on consumer electronics p. 1
Main Authors Li, Ying, Zheng, Danyang, Fang, He, Xing, Huanlai, Chen, Xiangyi, Cao, Xiaojun
Format Journal Article
LanguageEnglish
Published IEEE 2025
Subjects
Online AccessGet full text
ISSN0098-3063
1558-4127
DOI10.1109/TCE.2025.3582399

Cover

Abstract Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex tasks. Due to capacity and licensing constraints, more than one servers are required to cooperate in hosting a prompt chain. Consequently, a compromised prompt engineering-enabled server (PES) poses a significant risk to the entire CFN, potentially leading to data breaches, reduced user trust, and financial losses. Zero Trust (ZT) security architecture requires the traffic flows being validated and can efficiently address this security issue. This work investigates the problem of deploying prompt chain in ZT-enabled CFNs. To begin, we define the problem of prompt chain deployment in ZT-enabled CFNs (PCD-ZT) aiming to minimize the total service costs including deployment costs and ZT verification costs. After carefully analyzing the problem, we propose a novel factor called the verification measure (VeM) to help select proper servers hosting the prompt chain. Building on this factor, we then design the Directed sub-prompt-chAin embeddiNg (DAN) algorithm. Extensive simulation results address that DAN significantly outperforms the state-of-the-art benchmarks regarding the cost optimization.
AbstractList Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex tasks. Due to capacity and licensing constraints, more than one servers are required to cooperate in hosting a prompt chain. Consequently, a compromised prompt engineering-enabled server (PES) poses a significant risk to the entire CFN, potentially leading to data breaches, reduced user trust, and financial losses. Zero Trust (ZT) security architecture requires the traffic flows being validated and can efficiently address this security issue. This work investigates the problem of deploying prompt chain in ZT-enabled CFNs. To begin, we define the problem of prompt chain deployment in ZT-enabled CFNs (PCD-ZT) aiming to minimize the total service costs including deployment costs and ZT verification costs. After carefully analyzing the problem, we propose a novel factor called the verification measure (VeM) to help select proper servers hosting the prompt chain. Building on this factor, we then design the Directed sub-prompt-chAin embeddiNg (DAN) algorithm. Extensive simulation results address that DAN significantly outperforms the state-of-the-art benchmarks regarding the cost optimization.
Author Li, Ying
Chen, Xiangyi
Cao, Xiaojun
Zheng, Danyang
Fang, He
Xing, Huanlai
Author_xml – sequence: 1
  givenname: Ying
  orcidid: 0009-0004-4965-2920
  surname: Li
  fullname: Li, Ying
  organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China
– sequence: 2
  givenname: Danyang
  orcidid: 0000-0002-3031-7856
  surname: Zheng
  fullname: Zheng, Danyang
  email: dzheng5@switu.edu.cn
  organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China
– sequence: 3
  givenname: He
  orcidid: 0000-0002-4562-9190
  surname: Fang
  fullname: Fang, He
  organization: College of Computer and Cyber Security, Fujian Normal University, China
– sequence: 4
  givenname: Huanlai
  orcidid: 0000-0002-6345-7265
  surname: Xing
  fullname: Xing, Huanlai
  organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China
– sequence: 5
  givenname: Xiangyi
  orcidid: 0000-0001-5549-5336
  surname: Chen
  fullname: Chen, Xiangyi
  organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China
– sequence: 6
  givenname: Xiaojun
  orcidid: 0000-0001-5670-8196
  surname: Cao
  fullname: Cao, Xiaojun
  organization: Department of Computer Science, Georgia State University, GA, USA
BookMark eNpFkE1PwkAURScGEwHdu3Axf6D43ny0M0tTAU2IuqgbN83QvsYqtGRmCOHfWwKJq5ub3HMXZ8JGXd8RY_cIM0Swj0U-nwkQeia1EdLaKzZGrU2iUGQjNgawJpGQyhs2CeEHAJUWZsxWRX9wvg78w_fbXeT5t2s7_ky7TX_cUhf50L7I97zw-xAT6tx6QzXPh_E-El-0PkT-RvHQ-99wy64btwl0d8kp-1zMi_wlWb0vX_OnVVKhVDFpSKWQYmUyrIQyIq1rYxuBtlZgFVAjZS2zZp1CTdJhZaVxlAlrrUMDWsspg_Nv5fsQPDXlzrdb548lQnmyUQ42ypON8mJjQB7OSEtE_3MEZTRm8g_rG1zX
CODEN ITCEDA
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TCE.2025.3582399
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-4127
EndPage 1
ExternalDocumentID 10_1109_TCE_2025_3582399
11048517
Genre orig-research
GrantInformation_xml – fundername: Natural Science Foundation of Sichuan Province
  grantid: 2024NSFSC1456
  funderid: 10.13039/501100018542
– fundername: National Natural Science Foundation of China
  grantid: 62302404
  funderid: 10.13039/501100001809
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
ACGFO
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
HZ~
IFIPE
IPLJI
JAVBF
LAI
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
5VS
AAYXX
ACKIV
AETIX
AGSQL
AI.
AIBXA
ALLEH
CITATION
EJD
H~9
IBMZZ
ICLAB
IFJZH
VH1
ID FETCH-LOGICAL-c134t-fe46061c871c24826dd89f219d40940ef33d37fb60de3a1c938ae72999a180553
IEDL.DBID RIE
ISSN 0098-3063
IngestDate Wed Oct 01 05:59:44 EDT 2025
Wed Jul 02 05:55:37 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c134t-fe46061c871c24826dd89f219d40940ef33d37fb60de3a1c938ae72999a180553
ORCID 0000-0002-3031-7856
0000-0002-4562-9190
0009-0004-4965-2920
0000-0002-6345-7265
0000-0001-5549-5336
0000-0001-5670-8196
PageCount 1
ParticipantIDs crossref_primary_10_1109_TCE_2025_3582399
ieee_primary_11048517
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-00-00
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 2025-00-00
PublicationDecade 2020
PublicationTitle IEEE transactions on consumer electronics
PublicationTitleAbbrev T-CE
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0014528
Score 2.4256318
Snippet Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for...
SourceID crossref
ieee
SourceType Index Database
Publisher
StartPage 1
SubjectTerms AIGC service deployment
Artificial intelligence
Benchmark testing
Compute first networks
Consumer electronics
cost optimization
Costs
Optimization
prompt chain
Security
Servers
Simulation
Training
Zero Trust
zero trust network
Title Towards Prompt Chain Deployment in Zero Trust-enabled Compute First Networks
URI https://ieeexplore.ieee.org/document/11048517
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-4127
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014528
  issn: 0098-3063
  databaseCode: RIE
  dateStart: 19750101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07a8MwEBZNpnboM6XpCw1dOtixLSmRxpImhNKGDg6ELsayzjQUnJI4S399T7LdhEKhmy1kI-6E7j7dfXeE3Gkd5FJo4xmVC4-DVp7Ow9QTGbr3oFQUpJac_DLtT2b8aS7mNVndcWEAwCWfgW8fXSzfLLONvSrroanitpd8i7QGsl-RtX5CBlxEsimQiX4wa2KSgerFwxEiwUj4lhbKXJnXrQ3aaaribMr4iEyb1VSpJB_-ptR-9vWrUOO_l3tMDmvvkj5U2-GE7EFxSg52ag6ekefYJcqu6esKj4KSDt_TRUEfwTb-tf-j-PYGqyWNLRvDA8etMrTu_kDHC3QX6bRKHl93yGw8iocTr26p4GUh46WXA0fEEmYIk7KII7QwRqocTy1jcV4AOWOGDXLdDwywNMwUkymg_61UGspACHZO2sWygAtCETfhGOODQOZcy0grwzgYgYCF8chEXXLfCDn5rCpnJA5xBCpBhSRWIUmtkC7pWPFt59WSu_xj_Irs28-rq5Br0i5XG7hB56DUt25TfAOk97Ug
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDMDAs4jy9MDCkDaJ7TYeUWlVoK0YUqliieL4IiqkFLXpwq_n7CS0QkJiSyzLsu4s332---4IuVPKTQOhtKNlKhwOSjoq9WJHJOjeg5S-Gxty8mjcHkz481RMS7K65cIAgE0-g6b5tLF8PU9W5qmshaaKm17y22RHcM5FQdf6CRpw4QdViUz0hFkVlXRlK-z2EAv6ommIocwWel1boY22Ktaq9A_JuNpPkUzy0Vzlqpl8_SrV-O8NH5GD0r-kD8WBOCZbkJ2Q_Y2qg6dkGNpU2SV9XeBlkNPuezzL6COY1r9mPYp_b7CY09DwMRyw7CpNy_4PtD9Dh5GOi_TxZZ1M-r2wO3DKpgpO4jGeOylwxCxegkAp8TmCC60DmeK9pQ3ScyFlTLNOqtquBhZ7iWRBDOiBSxl7gSsEOyO1bJ7BOaGInHCM8Y4bpFwFvpKacdACIQvjvvYb5L4ScvRZ1M6ILOZwZYQKiYxColIhDVI34lvPKyV38cf4LdkdhKNhNHwav1ySPbNU8TByRWr5YgXX6Crk6sYekG9U3bht
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+Prompt+Chain+Deployment+in+Zero+Trust-enabled+Compute+First+Networks&rft.jtitle=IEEE+transactions+on+consumer+electronics&rft.au=Li%2C+Ying&rft.au=Zheng%2C+Danyang&rft.au=Fang%2C+He&rft.au=Xing%2C+Huanlai&rft.date=2025&rft.pub=IEEE&rft.issn=0098-3063&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTCE.2025.3582399&rft.externalDocID=11048517
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-3063&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-3063&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-3063&client=summon