2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) 2019
DOI: 10.1109/wcncw.2019.8902624
|View full text |Cite
|
Sign up to set email alerts
|

Cloud & Edge Trusted Virtualized Infrastructure Manager (VIM) - Security and Trust in OpenStack

Abstract: The Fifth Generation (5G) mobile networks promise faster connectivity and futuristic applications and services. In order to meet the high expectations, 5G joins forces with virtualization technologies like Network Functions Virtualization (NFV) and adopts cloud-native solutions. At the same time, it relies on shifting the computation to the network edge for offloading computing power, local caching, minimized latency and flexibility in the deployment. However, new opportunities unlock new security challenges. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…virtualization techniques will abstract hardware characteristics of the heterogeneous target nodes to present an integrated execution environment for the applications. As described in Section V, the nodes may feature different CPUs (i.e., x86 in the cloud and ARM/RISC-V in the edge [32]) and accelerators (e.g., GPUs and FPGAs [33]). Fig.…”
Section: Virtualization-based Runtime Optimizationmentioning
confidence: 99%
“…virtualization techniques will abstract hardware characteristics of the heterogeneous target nodes to present an integrated execution environment for the applications. As described in Section V, the nodes may feature different CPUs (i.e., x86 in the cloud and ARM/RISC-V in the edge [32]) and accelerators (e.g., GPUs and FPGAs [33]). Fig.…”
Section: Virtualization-based Runtime Optimizationmentioning
confidence: 99%
“…α ∈ [0, 1] represents the probability that a VNF is safe at startup, which depends on the certificate of faith of every software. Unless checked from the startup, we can no longer assure authenticity from the root [34]. Secure boot is the first line of protection and lays the groundwork for subsequent security assessments.…”
Section: A Authenticity Evaluationmentioning
confidence: 99%
“…The internal integrity test mainly checks the presence of hazard code, vulnerabilities, injected unfamiliar information, and the presence of malware in VNF. For instance, [34] proposed an internal integrity test by monitoring whether the operating system kernel has been modified.…”
Section: A Authenticity Evaluationmentioning
confidence: 99%