A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Authors

Abstract:

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a thorough understanding of security challenges and their solutions are required to reduce security concerns while developing new services. In this article, cloud computing, NFV and its VNFs from a security perspective is explained. Then, their security challenges with respect to cloud computing infrastructure and current solutions are discussed in a comparative scenario based way. Finally, proper security solutions for each scenario are proposed.  

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

A Survey of Cloud Computing Security: Issues, Challenges and Solutions

Cloud computing is a rapidly maturing technology that has given rise to a lot of recent innovations. As a delivery model for IT services, its capacity to stimulate growth by providing ready-made environments for various forms of development is unparalleled. Its very nature however makes it open to a variety of security issues that can affect both the providers and consumers of these cloud servi...

full text

A Survey on Cloud Computing Security, Challenges and Threats

Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has as...

full text

the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

15 صفحه اول

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

full text

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

full text

A Survey on Cloud Computing Security Issues

Cloud computing is changing businesses and governments. It offers flexible computation resources in a model where customers only pay for resources they use. This leads to cost savings when compared to a situation where organizations manage their own server farms. Very often such servers are running at a very low utilization level, which is partly because of old habits that lead to not placing m...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 8  issue 2

pages  29- 50

publication date 2020-02

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023