A Comparative Study on Secure Network Virtualization
نویسندگان
چکیده
Secure and efficient network virtualization is a key building block for virtualized environments such as data centers or enterprise networks. While machine virtualization alone provides immediate isolation of computing resources such as memory and CPU between guest domains, the network remains to be a shared resource as all traffic from guests eventually pass through a shared network resource and end up on the shared physical medium. As a result, we need mechanisms to (1) control the information flow between virtual machines (e.g., who can communicate with whom), (2) configure virtual and physical network resources, and (3) separate network resources used by each networking domain. Within HP Labs we have successfully developed and deployed technologies that enable secure networking within virtualized infrastructures. In this report, we present the findings of a comparative study that we conducted to evaluate the security, performance, and manageability of these approaches. We further report our experiences with prototype implementations on Xen platforms.
منابع مشابه
Improving Mobile Device Security with Operating System-Level Virtualization
In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances from a trustworthy and secure entity. This entity controls and manages the Android instances and provides an interface for remote administration and management of the device and its software. Our approach includes several security extensions for secure network access, integrity protection of data...
متن کاملImportance of Cloud Computing and its Security Issues in Network Virtualization Process
In this manuscript, the cloud computing and its security issues have been demonstrated in case of Network virtualization process. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud co...
متن کاملEfficient and Secure Authentication Handover using Network functions virtualization
Mobility of the subscriber is an important attribute to the success of a telecommunication network. With the advent of 5G networking which achieves high throughput rates by using heterogeneous nodes and frequent handovers, existing authentication and handover techniques should be revisited to securely and reliably perform handovers for LTE LTE. By virtualizing the nodes through Network Function...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملPosition Paper: Secure Virtual Network Embedding
Network virtualization has been recognized as an important technique to overcome the perceived ossification of the current Internet. Several variations of network virtualization have already been discussed in the literature. These approaches use virtualization to partition and/or combine physical network resources into virtual network resources. An actual deployment of virtual networks then req...
متن کامل