Towards security-aware virtual network embedding

نویسندگان

  • Shuhao Liu
  • Zhiping Cai
  • Hong Xu
  • Ming Xu
چکیده

Network virtualization is one of the fundamental building blocks of cloud computing, where computation, storage and networking resources are shared through virtualization technologies. However, the complexity of virtualization exposes additional security vulnerabilities, which can be taken advantage of by malicious users. While traditional network security technologies can help in virtualized environments, we argue that it is cost-effective to isolate virtual resources with high security demands from the untrusted ones. This paper attempts to tackle the security issue by offering physical isolation during virtual network embedding, the process of allocating virtual networks onto physical nodes and links. We start from modelling the security demands in virtualized environments by analysing typical security vulnerabilities. A simple abstracted concept of security demands is defined to capture the variations of security requirements, based on which we formulate security-aware virtual network embedding as an optimization problem. The proposed objective and constraint functions involve both resource and security restrictions. Then, two heuristic algorithms are developed to solve this problem with splittable or unsplittable virtual links, respectively. Our simulation results demonstrate their ISome preliminary results were presented at IEEE ICC 2014. ∗Corresponding author. Phone No.: +86-139-7519-2193 Email addresses: [email protected] (Shuhao Liu), [email protected] (Zhiping Cai), [email protected] (Hong Xu), [email protected] (Ming Xu) Preprint submitted to Computer Networks August 23, 2015 efficiency and effectiveness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a secured network virtualization

Network virtualization promises to fulfill the demand for an agile Internet that is friendly to technological innovation. In the past, tremendous effort s have been dedicated to studying the fundamental problem in network virtualization, namely Virtual Network Embedding (VNE). However, until recently, very limited work has addressed the security issues and implications of VNE or network virtual...

متن کامل

Memetic Multi-Objective Particle Swarm Optimization-Based Energy-Aware Virtual Network Embedding

In cloud infrastructure, accommodating multiple virtual networks on a single physical network reduces power consumed by physical resources and minimizes cost of operating cloud data centers. However, mapping multiple virtual network resources to physical network components, called virtual network embedding (VNE), is known to be NP-hard. With considering energy efficiency, the problem becomes mo...

متن کامل

Virtual Network with Security Guarantee Embedding Algorithms

Network virtualization has been widely concerned as the new technology to remedy the current ossification Internet architecture. Previous virtual network (VN) embedding algorithms focus on optimizing the use of resources with regard to performance with constraints on virtual nodes and links. There are few researches to analyze the security threat to the virtual network. In this paper, we first ...

متن کامل

Energy-Aware Virtual Network Embedding Approach for Distributed Cloud

Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, network virtualization suffers from the problem of mapping virtual links and nodes to physical network in most efficient way. This problem is called virtual network embedding (“VNE”)....

متن کامل

Steganalysis of embedding in difference of image pixel pairs by neural network

In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 91  شماره 

صفحات  -

تاریخ انتشار 2015