Designing Security-Aware Service Requests for NFV-Enabled Networks
Title | Designing Security-Aware Service Requests for NFV-Enabled Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Jmila, Houda, Blanc, Gregory |
Conference Name | 2019 28th International Conference on Computer Communication and Networks (ICCCN) |
Date Published | jul |
ISBN Number | 978-1-7281-1856-7 |
Keywords | Bandwidth, best practices, cloud computing, cloud-based applications, composability, Hardware, high-volume servers, Human Behavior, human factors, initial SFC requests, load-balancers, Metrics, network function virtualization, network functions, network service request, NFV environment, NFV-enabled networks, privacy, pubcrawl, resilience, Resiliency, resource allocation, resource allocation problem, Resource management, security, security aspects, security of data, security requirements, security-aware service request design, service function chains, software images, specialized hardware appliances, Substrates, supported service, Switches, virtualisation, virtualization, virtualization privacy |
Abstract | Network Function Virtualization (NFV) is a recent concept where virtualization enables the shift from network functions (e.g., routers, switches, load-balancers, proxies) on specialized hardware appliances to software images running on all-purpose, high-volume servers. The resource allocation problem in the NFV environment has received considerable attention in the past years. However, little attention was paid to the security aspects of the problem in spite of the increasing number of vulnerabilities faced by cloud-based applications. Securing the services is an urgent need to completely benefit from the advantages offered by NFV. In this paper, we show how a network service request, composed of a set of service function chains (SFC) should be modified and enriched to take into consideration the security requirements of the supported service. We examine the well-known security best practices and propose a two-step algorithm that extends the initial SFC requests to a more complex chaining model that includes the security requirements of the service. |
URL | https://ieeexplore.ieee.org/document/8847058/ |
DOI | 10.1109/ICCCN.2019.8847058 |
Citation Key | jmila_designing_2019 |
- service function chains
- Resiliency
- resource allocation
- resource allocation problem
- resource management
- security
- security aspects
- security of data
- security requirements
- security-aware service request design
- resilience
- software images
- specialized hardware appliances
- Substrates
- supported service
- Switches
- virtualisation
- Virtualization
- virtualization privacy
- load-balancers
- best practices
- Cloud Computing
- cloud-based applications
- composability
- Hardware
- high-volume servers
- Human behavior
- Human Factors
- initial SFC requests
- Bandwidth
- Metrics
- network function virtualization
- network functions
- network service request
- NFV environment
- NFV-enabled networks
- privacy
- pubcrawl