2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7997299
|View full text |Cite
|
Sign up to set email alerts
|

Assuring virtual network function image integrity and host sealing in Telco cloue

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…4c), allowing the configuration to be suited for the Smart Manufacturing threshold when γ = 0.0001 and even the Transport Industry threshold when γ = 0.00001, besides presenting a very similar behavior compared to the configuration with 8 VMs, 2 containers (γ = 0.001, red line with crosses). These findings evince what level of improvement that containerized VNFs must achieve to meet specific requirements, recalling that both software and hardware share relevance towards this aspect, as investigated in [25].…”
Section: Improved Failure Ratesmentioning
confidence: 73%
“…4c), allowing the configuration to be suited for the Smart Manufacturing threshold when γ = 0.0001 and even the Transport Industry threshold when γ = 0.00001, besides presenting a very similar behavior compared to the configuration with 8 VMs, 2 containers (γ = 0.001, red line with crosses). These findings evince what level of improvement that containerized VNFs must achieve to meet specific requirements, recalling that both software and hardware share relevance towards this aspect, as investigated in [25].…”
Section: Improved Failure Ratesmentioning
confidence: 73%
“…Fine-grained access control needs to be investigated with appropriate encryption to ensure a secure collaboration and interoperability between heterogeneous resources and different operational parties. A state-of-the-art analysis on security and privacy issues associated with edge cloud is performed in [206], while a preliminary study on MEC security is presented in [207]- [209]. Various intrusion detection techniques are in place for cloud computing, but for large-scale geo-distributed environments, this is still a challenge.…”
Section: Mec Security and Privacymentioning
confidence: 99%
“…The ETSI NFV architecture identifies three main building blocks: Introducing virtualized network resources into the IoT ecosystem brings multiple value-added features, accounting for their heterogeneity and rapid growth. When coupled with SDN, NFV can not only, provide advanced virtual monitoring tools, such as Intrusion Detection Systems (IDSs) and Deep Packet Inspectors (DPIs), but also provision, and configure on-demand and scalable network security appliances, such as firewalls and authentication systems, in order to cope with the attacks detected by the monitoring agents [24], [25]. Moreover, offloading the extra processing induced by security from these resource-constrained IoT devices to virtual instances [26] saves energy and improves efficiency leaving more headroom to other useful applications.…”
Section: ) Network Function Virtualizationmentioning
confidence: 99%