2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) 2017
DOI: 10.1109/icin.2017.7899394
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating trust in NFV: Addressing the challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…As described in [12], determining the VNF package integrity is a critical challenge in the setup of a trusted NFV environment. BUNKER addresses this challenge successfully without having to rely on an external Trusted Security Orchestrator (TSecO).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As described in [12], determining the VNF package integrity is a critical challenge in the setup of a trusted NFV environment. BUNKER addresses this challenge successfully without having to rely on an external Trusted Security Orchestrator (TSecO).…”
Section: Discussionmentioning
confidence: 99%
“…For example, with the myriad of novel Virtual Network Functions (VNF) being developed, it remains an open problem on how to ensure that the VNF package being acquired by end-users is not malicious and it was not tampered with. Research has been conducted in the NFV computing environment with the introduction of Trusted Platform Modules (TPM) and remote attestation services [12]. Although these systems are able to verify the state of the NFV environment, they rely on a central database to verify the VNF's package integrity.…”
Section: Introductionmentioning
confidence: 99%
“…Using the attestation server in this mode we can also see the lifetime of the integrity checking process in Figure 3. Here we see that once the machine is running successfully or is in a state where it can respond to the attestation server it can answer any request made [14]. The problem here however is that while this is known as "run-time" attestation, it is little more than occasional polling and re-measurement of already known and measured components.…”
Section: Multiple Machine Trustmentioning
confidence: 98%
“…Similarly, the Software-Defined Network (SDN) used to steer the users' packets through their vNSFs is also attested to ensure the correct vNSFs chain is applied for each user. The application of attestation mechanisms to NFV is a topic which is gaining increasing interest by the community [6].…”
Section: The Shield Conceptmentioning
confidence: 99%