Projects per year
Abstract
Network function virtualization (NFV) has been promising to improve the availability, programmability, and flexibility of network function deployment and communication facilities. Meanwhile, with the advancements of cloud technologies, there has been a trend to outsource network functions through virtualization to a cloud service provider, so as to alleviate the local burdens on provisioning and managing such hardware resources. Promising as it is, redirecting the communication traffic to a third-party service provider has drawn various security and privacy concerns. Traditional end-to-end encryption can protect the traffic in transmit, but it also hinders data usability. This dilemma has raised wide interests from both industry and academia, and great efforts have been made to realize privacy-preserving network function outsourcing that can guarantee the confidentiality of network communications while preserving the ability to inspect the traffic. In this article, we conduct a comprehensive survey of the state-of-the-art literature on network function outsourcing, with a special focus on privacy and security issues. We first give a brief introduction to NFV and pinpoint its challenges and security risks in the cloud context. Then, we present detailed descriptions and comparisons of existing secure network function outsourcing schemes in terms of functionality, efficiency, and security. Finally, we conclude by discussing possible future research directions.
Original language | English |
---|---|
Pages (from-to) | 1888-1919 |
Journal | Proceedings of the IEEE |
Volume | 109 |
Issue number | 12 |
Online published | 8 Dec 2021 |
DOIs | |
Publication status | Published - Dec 2021 |
Research Keywords
- Network function outsourcing
- network function virtualization (NFV)
- privacy preservation
Publisher's Copyright Statement
- This full text is made available under CC-BY 4.0. https://creativecommons.org/licenses/by/4.0/
Fingerprint
Dive into the research topics of 'Building In-the-Cloud Network Functions: Security and Privacy Challenges'. Together they form a unique fingerprint.-
RIF-ExtU-Lead: Enabling Secure and Efficient Cross-Silo Federated Learning at Scale
Li, B. (Main Project Coordinator [External]) & WANG, C. (Principal Investigator / Project Coordinator)
1/02/21 → …
Project: Research
-
GRF: Towards Full Accounting for Leakage Exploitation and Mitigation in Encrypted Databases
WANG, C. (Principal Investigator / Project Coordinator)
1/01/21 → 31/12/24
Project: Research
-
GRF: Towards Secure and Privacy-assured Truth Discovery from the Crowd
WANG, C. (Principal Investigator / Project Coordinator)
1/01/20 → 2/01/24
Project: Research
Student theses
-
Enabling Metadata-private Communication at Scale
JIANG, P. (Author), Wang, Q. (External Supervisor) & WANG, C. (Supervisor), 25 Jun 2024Student thesis: Doctoral Thesis