Towards Prompt Chain Deployment in Zero Trust-enabled Compute First Networks
Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex...
Saved in:
| Published in | IEEE transactions on consumer electronics p. 1 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
IEEE
2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0098-3063 1558-4127 |
| DOI | 10.1109/TCE.2025.3582399 |
Cover
| Abstract | Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex tasks. Due to capacity and licensing constraints, more than one servers are required to cooperate in hosting a prompt chain. Consequently, a compromised prompt engineering-enabled server (PES) poses a significant risk to the entire CFN, potentially leading to data breaches, reduced user trust, and financial losses. Zero Trust (ZT) security architecture requires the traffic flows being validated and can efficiently address this security issue. This work investigates the problem of deploying prompt chain in ZT-enabled CFNs. To begin, we define the problem of prompt chain deployment in ZT-enabled CFNs (PCD-ZT) aiming to minimize the total service costs including deployment costs and ZT verification costs. After carefully analyzing the problem, we propose a novel factor called the verification measure (VeM) to help select proper servers hosting the prompt chain. Building on this factor, we then design the Directed sub-prompt-chAin embeddiNg (DAN) algorithm. Extensive simulation results address that DAN significantly outperforms the state-of-the-art benchmarks regarding the cost optimization. |
|---|---|
| AbstractList | Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for AI-generated content (AIGC) services. In AIGC applications, multiple interconnected prompts are organized into a prompt chain to complete complex tasks. Due to capacity and licensing constraints, more than one servers are required to cooperate in hosting a prompt chain. Consequently, a compromised prompt engineering-enabled server (PES) poses a significant risk to the entire CFN, potentially leading to data breaches, reduced user trust, and financial losses. Zero Trust (ZT) security architecture requires the traffic flows being validated and can efficiently address this security issue. This work investigates the problem of deploying prompt chain in ZT-enabled CFNs. To begin, we define the problem of prompt chain deployment in ZT-enabled CFNs (PCD-ZT) aiming to minimize the total service costs including deployment costs and ZT verification costs. After carefully analyzing the problem, we propose a novel factor called the verification measure (VeM) to help select proper servers hosting the prompt chain. Building on this factor, we then design the Directed sub-prompt-chAin embeddiNg (DAN) algorithm. Extensive simulation results address that DAN significantly outperforms the state-of-the-art benchmarks regarding the cost optimization. |
| Author | Li, Ying Chen, Xiangyi Cao, Xiaojun Zheng, Danyang Fang, He Xing, Huanlai |
| Author_xml | – sequence: 1 givenname: Ying orcidid: 0009-0004-4965-2920 surname: Li fullname: Li, Ying organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China – sequence: 2 givenname: Danyang orcidid: 0000-0002-3031-7856 surname: Zheng fullname: Zheng, Danyang email: dzheng5@switu.edu.cn organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China – sequence: 3 givenname: He orcidid: 0000-0002-4562-9190 surname: Fang fullname: Fang, He organization: College of Computer and Cyber Security, Fujian Normal University, China – sequence: 4 givenname: Huanlai orcidid: 0000-0002-6345-7265 surname: Xing fullname: Xing, Huanlai organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China – sequence: 5 givenname: Xiangyi orcidid: 0000-0001-5549-5336 surname: Chen fullname: Chen, Xiangyi organization: School of Computing and Artificial Intelligence, Southwest Jiaotong University, Sichuan, China – sequence: 6 givenname: Xiaojun orcidid: 0000-0001-5670-8196 surname: Cao fullname: Cao, Xiaojun organization: Department of Computer Science, Georgia State University, GA, USA |
| BookMark | eNpFkE1PwkAURScGEwHdu3Axf6D43ny0M0tTAU2IuqgbN83QvsYqtGRmCOHfWwKJq5ub3HMXZ8JGXd8RY_cIM0Swj0U-nwkQeia1EdLaKzZGrU2iUGQjNgawJpGQyhs2CeEHAJUWZsxWRX9wvg78w_fbXeT5t2s7_ky7TX_cUhf50L7I97zw-xAT6tx6QzXPh_E-El-0PkT-RvHQ-99wy64btwl0d8kp-1zMi_wlWb0vX_OnVVKhVDFpSKWQYmUyrIQyIq1rYxuBtlZgFVAjZS2zZp1CTdJhZaVxlAlrrUMDWsspg_Nv5fsQPDXlzrdb548lQnmyUQ42ypON8mJjQB7OSEtE_3MEZTRm8g_rG1zX |
| CODEN | ITCEDA |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TCE.2025.3582399 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-4127 |
| EndPage | 1 |
| ExternalDocumentID | 10_1109_TCE_2025_3582399 11048517 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Natural Science Foundation of Sichuan Province grantid: 2024NSFSC1456 funderid: 10.13039/501100018542 – fundername: National Natural Science Foundation of China grantid: 62302404 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG ACGFO ACIWK ACNCT AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS HZ~ IFIPE IPLJI JAVBF LAI MS~ O9- OCL P2P RIA RIE RNS TAE TN5 5VS AAYXX ACKIV AETIX AGSQL AI. AIBXA ALLEH CITATION EJD H~9 IBMZZ ICLAB IFJZH VH1 |
| ID | FETCH-LOGICAL-c134t-fe46061c871c24826dd89f219d40940ef33d37fb60de3a1c938ae72999a180553 |
| IEDL.DBID | RIE |
| ISSN | 0098-3063 |
| IngestDate | Wed Oct 01 05:59:44 EDT 2025 Wed Jul 02 05:55:37 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c134t-fe46061c871c24826dd89f219d40940ef33d37fb60de3a1c938ae72999a180553 |
| ORCID | 0000-0002-3031-7856 0000-0002-4562-9190 0009-0004-4965-2920 0000-0002-6345-7265 0000-0001-5549-5336 0000-0001-5670-8196 |
| PageCount | 1 |
| ParticipantIDs | crossref_primary_10_1109_TCE_2025_3582399 ieee_primary_11048517 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2025-00-00 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – year: 2025 text: 2025-00-00 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE transactions on consumer electronics |
| PublicationTitleAbbrev | T-CE |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0014528 |
| Score | 2.4256318 |
| Snippet | Compute first networks (CFN) prioritize computing resources in network planning for higher utilization and performance, making them an ideal platform for... |
| SourceID | crossref ieee |
| SourceType | Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | AIGC service deployment Artificial intelligence Benchmark testing Compute first networks Consumer electronics cost optimization Costs Optimization prompt chain Security Servers Simulation Training Zero Trust zero trust network |
| Title | Towards Prompt Chain Deployment in Zero Trust-enabled Compute First Networks |
| URI | https://ieeexplore.ieee.org/document/11048517 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-4127 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014528 issn: 0098-3063 databaseCode: RIE dateStart: 19750101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07a8MwEBZNpnboM6XpCw1dOtixLSmRxpImhNKGDg6ELsayzjQUnJI4S399T7LdhEKhmy1kI-6E7j7dfXeE3Gkd5FJo4xmVC4-DVp7Ow9QTGbr3oFQUpJac_DLtT2b8aS7mNVndcWEAwCWfgW8fXSzfLLONvSrroanitpd8i7QGsl-RtX5CBlxEsimQiX4wa2KSgerFwxEiwUj4lhbKXJnXrQ3aaaribMr4iEyb1VSpJB_-ptR-9vWrUOO_l3tMDmvvkj5U2-GE7EFxSg52ag6ekefYJcqu6esKj4KSDt_TRUEfwTb-tf-j-PYGqyWNLRvDA8etMrTu_kDHC3QX6bRKHl93yGw8iocTr26p4GUh46WXA0fEEmYIk7KII7QwRqocTy1jcV4AOWOGDXLdDwywNMwUkymg_61UGspACHZO2sWygAtCETfhGOODQOZcy0grwzgYgYCF8chEXXLfCDn5rCpnJA5xBCpBhSRWIUmtkC7pWPFt59WSu_xj_Irs28-rq5Br0i5XG7hB56DUt25TfAOk97Ug |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDMDAs4jy9MDCkDaJ7TYeUWlVoK0YUqliieL4IiqkFLXpwq_n7CS0QkJiSyzLsu4s332---4IuVPKTQOhtKNlKhwOSjoq9WJHJOjeg5S-Gxty8mjcHkz481RMS7K65cIAgE0-g6b5tLF8PU9W5qmshaaKm17y22RHcM5FQdf6CRpw4QdViUz0hFkVlXRlK-z2EAv6ommIocwWel1boY22Ktaq9A_JuNpPkUzy0Vzlqpl8_SrV-O8NH5GD0r-kD8WBOCZbkJ2Q_Y2qg6dkGNpU2SV9XeBlkNPuezzL6COY1r9mPYp_b7CY09DwMRyw7CpNy_4PtD9Dh5GOi_TxZZ1M-r2wO3DKpgpO4jGeOylwxCxegkAp8TmCC60DmeK9pQ3ScyFlTLNOqtquBhZ7iWRBDOiBSxl7gSsEOyO1bJ7BOaGInHCM8Y4bpFwFvpKacdACIQvjvvYb5L4ScvRZ1M6ILOZwZYQKiYxColIhDVI34lvPKyV38cf4LdkdhKNhNHwav1ySPbNU8TByRWr5YgXX6Crk6sYekG9U3bht |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+Prompt+Chain+Deployment+in+Zero+Trust-enabled+Compute+First+Networks&rft.jtitle=IEEE+transactions+on+consumer+electronics&rft.au=Li%2C+Ying&rft.au=Zheng%2C+Danyang&rft.au=Fang%2C+He&rft.au=Xing%2C+Huanlai&rft.date=2025&rft.pub=IEEE&rft.issn=0098-3063&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTCE.2025.3582399&rft.externalDocID=11048517 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-3063&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-3063&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-3063&client=summon |