多提供者安全虚拟网络嵌入

Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu
{"title":"多提供者安全虚拟网络嵌入","authors":"Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu","doi":"10.1109/NTMS.2018.8328706","DOIUrl":null,"url":null,"abstract":"Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Multi-Provider Secure Virtual Network Embedding\",\"authors\":\"Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu\",\"doi\":\"10.1109/NTMS.2018.8328706\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.\",\"PeriodicalId\":140704,\"journal\":{\"name\":\"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NTMS.2018.8328706\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2018.8328706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

网络虚拟化使租户能够从一个或多个基础设施提供商(InP)那里租用计算和网络资源,就像基础设施即服务(IaaS)一样。因此,租户将其网络全部或部分外包,以减少资本支出,同时仍期望为客户提供相同质量的服务。然而,这些服务可能依赖于租户、租户的客户或法律认为敏感的数据,这些数据应该得到适当的保护。此外,个人数据保护法与提供最佳客户体验的目标相结合,可能会导致租户将其虚拟网络分布在多个inp上。然而,不同inp之间的互连应该尊重它们的安全策略。在本文中,我们的目标是通过保证租户和inp在创建虚拟网络时都执行其安全策略来简化网络虚拟化的采用。为此,我们在多提供者上下文中提出了一个虚拟网络嵌入解决方案,以及我们如何在用例中利用它。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Multi-Provider Secure Virtual Network Embedding
Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A New Dynamic Trust Model for "On Cloud" Federated Identity Management Privacy Preserving Queries on Directed Graph "Speak, Friend, and Enter" - Secure, Spoken One-Time Password Authentication Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent Buildings
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1