Visible to the public End-To-End Security Architecture for Federated Cloud and IoT Networks

TitleEnd-To-End Security Architecture for Federated Cloud and IoT Networks
Publication TypeConference Paper
Year of Publication2017
AuthorsMassonet, P., Deru, L., Achour, A., Dupont, S., Levin, A., Villari, M.
Conference Name2017 IEEE International Conference on Smart Computing (SMARTCOMP)
Keywordsactuator security, cloud computing, cloud networks, clouds, Communication networks, composability, Computer architecture, Data analysis, data analytics, data protection, end-to-end security architecture, heterogeneous platforms, Human Behavior, Internet of Things, IoT networks, Metrics, network federation mechanisms, network function virtualisation, network slices protection, NFV, pubcrawl, resilience, Resiliency, security, security of data, security policy enforcement, Sensors, service function chaining, SFC, smart Internet of Things, software architecture, virtualisation
Abstract

Smart Internet of Things (IoT) applications will rely on advanced IoT platforms that not only provide access to IoT sensors and actuators, but also provide access to cloud services and data analytics. Future IoT platforms should thus provide connectivity and intelligence. One approach to connecting IoT devices, IoT networks to cloud networks and services is to use network federation mechanisms over the internet to create network slices across heterogeneous platforms. Network slices also need to be protected from potential external and internal threats. In this paper we describe an approach for enforcing global security policies in the federated cloud and IoT networks. Our approach allows a global security to be defined in the form of a single service manifest and enforced across all federation network segments. It relies on network function virtualisation (NFV) and service function chaining (SFC) to enforce the security policy. The approach is illustrated with two case studies: one for a user that wishes to securely access IoT devices and another in which an IoT infrastructure administrator wishes to securely access some remote cloud and data analytics services.

URLhttp://ieeexplore.ieee.org/document/7947005/
DOI10.1109/SMARTCOMP.2017.7947005
Citation Keymassonet_end–end_2017