Abstract
Network virtualization is one of the fundamental building blocks of cloud computing, where computation, storage and networking resources are shared through virtualization technologies. However, the complexity of virtualization exposes additional security vulnerabilities, which can be taken advantage of by malicious users. While traditional network security technologies can help in virtualized environments, we argue that it is cost-effective to isolate virtual resources with high security demands from the untrusted ones.
This paper attempts to tackle the security issue by offering physical isolation during virtual network embedding, the process of allocating virtual networks onto physical nodes and links. We start from modeling the security demands in virtualized environments by analyzing typical security vulnerabilities. A simple abstracted concept of security demands is defined to capture the variations of security requirements, based on which we formulate security-aware virtual network embedding as an optimization problem. The proposed objective and constraint functions involve both resource and security restrictions. Then, two heuristic algorithms are developed to solve this problem with splittable or unsplittable virtual links, respectively. Our simulation results demonstrate their efficiency and effectiveness.
This paper attempts to tackle the security issue by offering physical isolation during virtual network embedding, the process of allocating virtual networks onto physical nodes and links. We start from modeling the security demands in virtualized environments by analyzing typical security vulnerabilities. A simple abstracted concept of security demands is defined to capture the variations of security requirements, based on which we formulate security-aware virtual network embedding as an optimization problem. The proposed objective and constraint functions involve both resource and security restrictions. Then, two heuristic algorithms are developed to solve this problem with splittable or unsplittable virtual links, respectively. Our simulation results demonstrate their efficiency and effectiveness.
| Original language | English |
|---|---|
| Pages (from-to) | 151-163 |
| Journal | Computer Networks |
| Volume | 91 |
| Online published | 31 Aug 2015 |
| DOIs | |
| Publication status | Published - 14 Nov 2015 |
Research Keywords
- Cloud computing
- Network virtualization
- Resource allocation
- Virtual network embedding
Fingerprint
Dive into the research topics of 'Towards Security-aware Virtual Network Embedding'. Together they form a unique fingerprint.Projects
- 1 Finished
-
ECS: Exploring Elasticity for Wide Area Traffic Management in Geo-distributed Datacenters
XU, H. (Principal Investigator / Project Coordinator)
1/09/14 → 11/02/19
Project: Research
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver