A. Kannan, Gerald Q. Maguire, Ayush Sharma, Volker Fusenig, P. Schoo
{"title":"网络中基于n树的密钥分发作为一种服务供应模型","authors":"A. Kannan, Gerald Q. Maguire, Ayush Sharma, Volker Fusenig, P. Schoo","doi":"10.1145/2345396.2345550","DOIUrl":null,"url":null,"abstract":"Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"N-ary tree based key distribution in a network as a service provisioning model\",\"authors\":\"A. Kannan, Gerald Q. Maguire, Ayush Sharma, Volker Fusenig, P. Schoo\",\"doi\":\"10.1145/2345396.2345550\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.\",\"PeriodicalId\":290400,\"journal\":{\"name\":\"International Conference on Advances in Computing, Communications and Informatics\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Advances in Computing, Communications and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2345396.2345550\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Advances in Computing, Communications and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2345396.2345550","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
N-ary tree based key distribution in a network as a service provisioning model
Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.