2022
DOI: 10.1109/tmc.2020.3046968
|View full text |Cite
|
Sign up to set email alerts
|

QoS and Resource-Aware Security Orchestration and Life Cycle Management

Abstract: Zero-touch network and Service Management (ZSM) exploits Network Function Virtualization (NFV) and Software-Defined Networking (SDN) to efficiently and dynamically orchestrate different Service Function Chaining (SFC), whereby reducing capital expenditure and operation expenses. The SFC is an optimization problem that shall consider different constraints, such as Quality of Service (QoS), and actual resources, to achieve cost-efficient scheduling and allocation of the service functions. However, the large-scal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…Thus, reliable and secure communications are paramount to ensure service availability while preventing data and privacy leakage. To this end, authentication, authorization, and transmission encryption services are required 4 . The authentication service guarantees that the communication is established among legitimate entities.…”
Section: A Trust In Communicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, reliable and secure communications are paramount to ensure service availability while preventing data and privacy leakage. To this end, authentication, authorization, and transmission encryption services are required 4 . The authentication service guarantees that the communication is established among legitimate entities.…”
Section: A Trust In Communicationsmentioning
confidence: 99%
“…3. As a result, 5G introduces a new authentication framework enabling an end-user device to perform not only the primary authentication for network access, but also a secondary authentication for service access 4 . The control (signaling) messages and user data should be exchanged over encrypted and integrity-protected channels in order to ensure compliance with privacy regulations and obviate the risk of sensitive information leakage and tampering.…”
Section: A Trust In Communicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, finding valid deployment options becomes exponentially harder with each added component and is infeasible for larger deployments. Tong et al 38 and, to some extent Heintz et al 36 take a similar approach to FogTorch, while 4‐7,35,39‐55 employ a more efficient heuristics approach to solve the formalized optimization problem. Naas et al 56 offer a heuristics‐based solution as well, but place data replicas rather than services, a challenge that is also addressed in References 57,58.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, an unhealthy Invoker is identified as such after not responding for a certain time, yet this delay can be an issue for low-latency use cases, since latency can grow considerably before the Invoker is switched into an unhealthy state. Before simply distinguishing between healthy and unhealthy controllers, 6 An OpenWhisk version released while we were writing this paper changed this: Open-Whisk no longer checks whether the available storage exceeds the maximum function size. Instead, it checks whether the available storage size exceeds the actual function size plus an estimated buffer based on the base64 encoding in CouchDB.…”
Section: C3: Compute Load Estimationmentioning
confidence: 99%