{"title":"基于shamir算法的服务路径配置方法研究","authors":"Gao Ming, Ying Lili","doi":"10.1109/CISCE50729.2020.00083","DOIUrl":null,"url":null,"abstract":"A service path configuration method on shamir algorithm is advanced. The data path information is distributed and verified to do the test and verify the service chain deployment through the packet in message of Openflow. First, the path verification identification is generated according to the polynomial shamir sharing algorithm. And then with the distrihution of service chain deployment, the controller distributes the control verification flow table. When the service traffic passes through the configuration switch, the path verification message will be uploaded, and the controller will carry out the verification and decision judgment. Finally, the experiment shows the correctness and security of the method.","PeriodicalId":101777,"journal":{"name":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on service path configuration method based on shamir algorithm\",\"authors\":\"Gao Ming, Ying Lili\",\"doi\":\"10.1109/CISCE50729.2020.00083\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A service path configuration method on shamir algorithm is advanced. The data path information is distributed and verified to do the test and verify the service chain deployment through the packet in message of Openflow. First, the path verification identification is generated according to the polynomial shamir sharing algorithm. And then with the distrihution of service chain deployment, the controller distributes the control verification flow table. When the service traffic passes through the configuration switch, the path verification message will be uploaded, and the controller will carry out the verification and decision judgment. Finally, the experiment shows the correctness and security of the method.\",\"PeriodicalId\":101777,\"journal\":{\"name\":\"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISCE50729.2020.00083\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Communications, Information System and Computer Engineering (CISCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISCE50729.2020.00083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on service path configuration method based on shamir algorithm
A service path configuration method on shamir algorithm is advanced. The data path information is distributed and verified to do the test and verify the service chain deployment through the packet in message of Openflow. First, the path verification identification is generated according to the polynomial shamir sharing algorithm. And then with the distrihution of service chain deployment, the controller distributes the control verification flow table. When the service traffic passes through the configuration switch, the path verification message will be uploaded, and the controller will carry out the verification and decision judgment. Finally, the experiment shows the correctness and security of the method.