支持多租户云的小单元安全性

B. Abubakar, H. Mouratidis
{"title":"支持多租户云的小单元安全性","authors":"B. Abubakar, H. Mouratidis","doi":"10.1109/NigeriaComputConf45974.2019.8949667","DOIUrl":null,"url":null,"abstract":"The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network’s edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing.The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multi-Tenancy Cloud-Enabled Small Cell Security\",\"authors\":\"B. Abubakar, H. Mouratidis\",\"doi\":\"10.1109/NigeriaComputConf45974.2019.8949667\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network’s edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing.The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.\",\"PeriodicalId\":228657,\"journal\":{\"name\":\"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949667\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949667","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

第五代(5G)网络的预期技术进步是能够通过网络功能虚拟化(NFV)和边缘云计算的原型,以虚拟网络设备的形式直接将智能应用于网络边缘。软件定义网络(SDN)和NFV等创新技术的采用和使用是使5G网络更有前景的关键。然而,实现这些技术会产生新的安全挑战。云支持的小型单元(CESC)提供了多运营商平台,可以在虚拟环境中集成和执行。向多个运营商/租户提供服务,以访问统一网络架构中的技术和协议,需要定义良好的安全方法,以提供安全的数据通信、隐私和完整性。CESC安全需求分析使用安全Tropos (SecTro)方法进行。本文将深入研究CESC的安全挑战,并提供可能的解决方案来缓解这些挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Multi-Tenancy Cloud-Enabled Small Cell Security
The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network’s edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing.The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信