Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3040992.3040995acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

A First Step Towards Security Extension for NFV Orchestrator

Published: 24 March 2017 Publication History

Abstract

Network Functions Virtualization (NFV) has recently emerged as one of the new networking paradigms to significantly change the way that the networks and services are deployed, managed, and operated. One of the major advantages of NFV is to reduce hardware cost, meanwhile increasing service agility and scalability. Recently, there are many platforms for NFV management and orchestration (MANO) are available, however few of them contains dedicated modules or components for security management. This paper is intended to study the feasibility of extending the current NFV orchestrator to have the capability of managing security mechanisms. To do that, we propose a security extension module based on TOSCA data model which is commonly used by NFV MANO architecture. We then develop an access control use case to illustrate the usage of our proposed security extension. Specifically, we integrate the security extension into the Moon framework, which can automatically verify security attributes, generate access control policies, and further enforce the policies through the underlying infrastructure according to the high-level security policies. The preliminary results show that our security extension can work together with the NFV orchestrator to enable fine-grained access control to protect resources and services.

References

[1]
YAML Ain't Markup Langauge. http://yaml.org/, May 2001.
[2]
Cloudnfv. http://www.cloudnfv.com/, Jan 2014.
[3]
OpenMANO. https://github.com/nfvlabs/openmano, Mar 2015.
[4]
OpenBaton. https://openbaton.github.io/, Jan 2016.
[5]
Alcatel-Lucent. Cloudband. http://www.tmcnet.com/redir/?u=1010632, 2014.
[6]
Z. Bronstein and E. Shraga. NFV Virtualisation of the Home Environment. In CCNC' 14, pages 899--904, Jan 2014.
[7]
J. Carapinha et al. Network Virtualization - Opportunities and Challenges for Operators. In FIS'10, pages 138--147, 2010.
[8]
A. Dutta. Security Challenges and Opportunities in SDN/NFV Networks. http://www.isr.umd.edu/sites/default/files/Dutta.pdf, Nov 2016.
[9]
ETSI. Network Functions Virtualization: An Introduction, Benefits, Enablers, Challenges & Call for Action, Oct 2012.
[10]
ETSI. Network Functions Virtualization (NFV); Management and Orchestration, Dec 2014.
[11]
ETSI. Network Functions Virtualization (NFV): NFV Security, Security and Trust Guidance, Dec 2014.
[12]
ETSI. Network Functions Virtualization (NFV): Security Report, Security Management and Monitoring for NFV, Nov 2015.
[13]
B. Han et al. Network Function Virtualization: Challenges and Opportunities for Innovations. IEEE Communications Magazine, 53(2):90--97, Feb 2015.
[14]
H. Hawilo et al. NFV: State of the Art, Challenges, and Implementation in Next Generation Mobile Networks (vEPC). IEEE Network, 28(6):18--26, Nov 2014.
[15]
Heat. Heat - Openstack Orchestration. https://wiki.openstack.org/wiki/Heat, May 2014.
[16]
B. Jaeger. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture. In IEEE TrustCom' 15, pages 1255--1260, Aug 2015.
[17]
R. Jain and S. Paul. Network Virtualization and Software Defined Networking for Cloud Computing: a Survey. IEEE Communications Magazine, 51(11):24--31, November 2013.
[18]
R. Mijumbi et al. Network Function Virtualization: State-of-the-Art and Research Challenges. IEEE Communications Surveys & Tutorials, 18(1):236--262, 2016.
[19]
OPNFV. Moon - Security Management Module. https://wiki.opnfv.org/display/moon/Moon, Apr 2016.
[20]
M. Pattaranantakul et al. SecMANO: Towards Network Functions Virtualization (NFV) based Security MANagement and Orchestration. In IEEE TrustCom' 16, Aug 2016.
[21]
Tacker. Tacker - OpenStack NFV Orchestration. https://wiki.openstack.org/wiki/Tacker, 2013.
[22]
TOSCA. TOSCA Simple Profile for Network Functions Virtualization (NFV version 1.0), Mar 2016.

Cited By

View all
  • (2024)Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing securityInternational Journal of Information Security10.1007/s10207-024-00900-523:6(3569-3589)Online publication date: 20-Aug-2024
  • (2022)Mapping the VNFs and VLs of a RAN Slice Onto Intelligent PoPs in Beyond 5G Mobile NetworksIEEE Open Journal of the Communications Society10.1109/OJCOMS.2022.31650003(670-704)Online publication date: 2022
  • (2021)Survey on Multi-Access Edge Computing Security and PrivacyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.306254623:2(1078-1124)Online publication date: Oct-2022
  • Show More Cited By

Index Terms

  1. A First Step Towards Security Extension for NFV Orchestrator

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SDN-NFVSec '17: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
    March 2017
    80 pages
    ISBN:9781450349086
    DOI:10.1145/3040992
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 March 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data model
    2. network functions virtualization (NFV)
    3. security management
    4. service orchestration

    Qualifiers

    • Research-article

    Conference

    CODASPY '17
    Sponsor:

    Acceptance Rates

    SDN-NFVSec '17 Paper Acceptance Rate 4 of 10 submissions, 40%;
    Overall Acceptance Rate 11 of 30 submissions, 37%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing securityInternational Journal of Information Security10.1007/s10207-024-00900-523:6(3569-3589)Online publication date: 20-Aug-2024
    • (2022)Mapping the VNFs and VLs of a RAN Slice Onto Intelligent PoPs in Beyond 5G Mobile NetworksIEEE Open Journal of the Communications Society10.1109/OJCOMS.2022.31650003(670-704)Online publication date: 2022
    • (2021)Survey on Multi-Access Edge Computing Security and PrivacyIEEE Communications Surveys & Tutorials10.1109/COMST.2021.306254623:2(1078-1124)Online publication date: Oct-2022
    • (2021)An Overview of the Security Landscape of Virtual Mobile NetworksIEEE Access10.1109/ACCESS.2021.31333199(169014-169030)Online publication date: 2021
    • (2021)A Priority-Based Domain Type Enforcement for Exception ManagementFoundations and Practice of Security10.1007/978-3-030-70881-8_5(65-81)Online publication date: 27-Feb-2021
    • (2020)State of the Art and Research Challenges in the Security Technologies of Network Function VirtualizationIEEE Internet Computing10.1109/MIC.2019.295671224:1(25-35)Online publication date: 1-Jan-2020
    • (2020)A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2019.293389922:1(196-248)Online publication date: Sep-2021
    • (2020)Network Functions Virtualization Access Control as a ServiceData and Applications Security and Privacy XXXIV10.1007/978-3-030-49669-2_6(100-117)Online publication date: 18-Jun-2020
    • (2019)A Survey on Emerging SDN and NFV Security Mechanisms for IoT SystemsIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286235021:1(812-837)Online publication date: Sep-2020
    • (2018)Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the CloudsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.2889709(1-1)Online publication date: 2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media