December 08, 2016

NFV security considerations for cloud-based mobile virtual network operators

  • Gurtov A.
  • Khatri V.
  • Monshizadeh M.

Cloud computing offers benefits of sharing computing and network resources among multiple mobile network operators. To utilize such benefits, in earlier paper we proposed a platform called telecommunication network as a service (TaaS). Sharing of such resources in cloud technology affects security of whole mobile network in general and software defined network (SDN) & network functions virtualization (NFV) in particular. In this paper, we have analyzed open platform for network functions virtualization (OPNFV) activities and compared them with TaaS concept to find commonalities and see how well it addresses security concerns outlined for TaaS. Through a comparison we show OPNFV security doesn't cover application security at all, however it partially covers data security and considerably covers hypervisor, SDN & NFV security. Therefore, OPNFV security needs to be revised in areas of data and application domain specially to meet the security requirements for TaaS. Furthermore, we conclude that our proposed TaaS platform implements at least current security requirements outlined in OPNFV specification.

View Original Article

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...