Security-aware optimal resource allocation for virtual network embedding
Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. A...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 384 |
---|---|
container_issue | |
container_start_page | 378 |
container_title | |
container_volume | |
creator | Bays, L. R. Oliveira, R. R. Buriol, L. S. Barcellos, M. P. Gaspary, L. P. |
description | Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers. |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6380045</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6380045</ieee_id><sourcerecordid>6380045</sourcerecordid><originalsourceid>FETCH-ieee_primary_63800453</originalsourceid><addsrcrecordid>eNp9jNEKgjAYRhcVJOUTdLMXEKbTuV1H4X3dy9LfWKmTfzPx7ZPouqvDx_k4KxKqXHLFYimTVObr745TkXMe85RtSJDEIouUYNmOhM49GWN8OSuZBaS4QjWi8XOkJ41A7eBNp1uK4OyIFVDdtrbS3tieNhbp26AfF9-Dnyy-KHR3qGvTPw5k2-jWQfjjnhwv59upiAwAlAMuVZxLwSVjacb_2w8tXTyu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security-aware optimal resource allocation for virtual network embedding</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</creator><creatorcontrib>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</creatorcontrib><description>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</description><identifier>ISSN: 2165-9605</identifier><identifier>ISBN: 9781467331340</identifier><identifier>ISBN: 1467331341</identifier><identifier>EISBN: 9783901882487</identifier><identifier>EISBN: 3901882480</identifier><language>eng</language><publisher>IEEE</publisher><subject>Bandwidth ; Cryptography ; Resource management ; Routing protocols ; Substrates</subject><ispartof>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), 2012, p.378-384</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6380045$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6380045$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bays, L. R.</creatorcontrib><creatorcontrib>Oliveira, R. R.</creatorcontrib><creatorcontrib>Buriol, L. S.</creatorcontrib><creatorcontrib>Barcellos, M. P.</creatorcontrib><creatorcontrib>Gaspary, L. P.</creatorcontrib><title>Security-aware optimal resource allocation for virtual network embedding</title><title>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm)</title><addtitle>CNSM</addtitle><description>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</description><subject>Bandwidth</subject><subject>Cryptography</subject><subject>Resource management</subject><subject>Routing protocols</subject><subject>Substrates</subject><issn>2165-9605</issn><isbn>9781467331340</isbn><isbn>1467331341</isbn><isbn>9783901882487</isbn><isbn>3901882480</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jNEKgjAYRhcVJOUTdLMXEKbTuV1H4X3dy9LfWKmTfzPx7ZPouqvDx_k4KxKqXHLFYimTVObr745TkXMe85RtSJDEIouUYNmOhM49GWN8OSuZBaS4QjWi8XOkJ41A7eBNp1uK4OyIFVDdtrbS3tieNhbp26AfF9-Dnyy-KHR3qGvTPw5k2-jWQfjjnhwv59upiAwAlAMuVZxLwSVjacb_2w8tXTyu</recordid><startdate>201210</startdate><enddate>201210</enddate><creator>Bays, L. R.</creator><creator>Oliveira, R. R.</creator><creator>Buriol, L. S.</creator><creator>Barcellos, M. P.</creator><creator>Gaspary, L. P.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201210</creationdate><title>Security-aware optimal resource allocation for virtual network embedding</title><author>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_63800453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Bandwidth</topic><topic>Cryptography</topic><topic>Resource management</topic><topic>Routing protocols</topic><topic>Substrates</topic><toplevel>online_resources</toplevel><creatorcontrib>Bays, L. R.</creatorcontrib><creatorcontrib>Oliveira, R. R.</creatorcontrib><creatorcontrib>Buriol, L. S.</creatorcontrib><creatorcontrib>Barcellos, M. P.</creatorcontrib><creatorcontrib>Gaspary, L. P.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bays, L. R.</au><au>Oliveira, R. R.</au><au>Buriol, L. S.</au><au>Barcellos, M. P.</au><au>Gaspary, L. P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security-aware optimal resource allocation for virtual network embedding</atitle><btitle>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm)</btitle><stitle>CNSM</stitle><date>2012-10</date><risdate>2012</risdate><spage>378</spage><epage>384</epage><pages>378-384</pages><issn>2165-9605</issn><isbn>9781467331340</isbn><isbn>1467331341</isbn><eisbn>9783901882487</eisbn><eisbn>3901882480</eisbn><abstract>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</abstract><pub>IEEE</pub></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2165-9605 |
ispartof | 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), 2012, p.378-384 |
issn | 2165-9605 |
language | eng |
recordid | cdi_ieee_primary_6380045 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Bandwidth Cryptography Resource management Routing protocols Substrates |
title | Security-aware optimal resource allocation for virtual network embedding |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T18%3A41%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security-aware%20optimal%20resource%20allocation%20for%20virtual%20network%20embedding&rft.btitle=2012%208th%20international%20conference%20on%20network%20and%20service%20management%20(cnsm)%20and%202012%20workshop%20on%20systems%20virtualiztion%20management%20(svm)&rft.au=Bays,%20L.%20R.&rft.date=2012-10&rft.spage=378&rft.epage=384&rft.pages=378-384&rft.issn=2165-9605&rft.isbn=9781467331340&rft.isbn_list=1467331341&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E6380045%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783901882487&rft.eisbn_list=3901882480&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6380045&rfr_iscdi=true |