Security-aware optimal resource allocation for virtual network embedding

Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. A...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bays, L. R., Oliveira, R. R., Buriol, L. S., Barcellos, M. P., Gaspary, L. P.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 384
container_issue
container_start_page 378
container_title
container_volume
creator Bays, L. R.
Oliveira, R. R.
Buriol, L. S.
Barcellos, M. P.
Gaspary, L. P.
description Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6380045</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6380045</ieee_id><sourcerecordid>6380045</sourcerecordid><originalsourceid>FETCH-ieee_primary_63800453</originalsourceid><addsrcrecordid>eNp9jNEKgjAYRhcVJOUTdLMXEKbTuV1H4X3dy9LfWKmTfzPx7ZPouqvDx_k4KxKqXHLFYimTVObr745TkXMe85RtSJDEIouUYNmOhM49GWN8OSuZBaS4QjWi8XOkJ41A7eBNp1uK4OyIFVDdtrbS3tieNhbp26AfF9-Dnyy-KHR3qGvTPw5k2-jWQfjjnhwv59upiAwAlAMuVZxLwSVjacb_2w8tXTyu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security-aware optimal resource allocation for virtual network embedding</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</creator><creatorcontrib>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</creatorcontrib><description>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</description><identifier>ISSN: 2165-9605</identifier><identifier>ISBN: 9781467331340</identifier><identifier>ISBN: 1467331341</identifier><identifier>EISBN: 9783901882487</identifier><identifier>EISBN: 3901882480</identifier><language>eng</language><publisher>IEEE</publisher><subject>Bandwidth ; Cryptography ; Resource management ; Routing protocols ; Substrates</subject><ispartof>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), 2012, p.378-384</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6380045$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6380045$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bays, L. R.</creatorcontrib><creatorcontrib>Oliveira, R. R.</creatorcontrib><creatorcontrib>Buriol, L. S.</creatorcontrib><creatorcontrib>Barcellos, M. P.</creatorcontrib><creatorcontrib>Gaspary, L. P.</creatorcontrib><title>Security-aware optimal resource allocation for virtual network embedding</title><title>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm)</title><addtitle>CNSM</addtitle><description>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</description><subject>Bandwidth</subject><subject>Cryptography</subject><subject>Resource management</subject><subject>Routing protocols</subject><subject>Substrates</subject><issn>2165-9605</issn><isbn>9781467331340</isbn><isbn>1467331341</isbn><isbn>9783901882487</isbn><isbn>3901882480</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jNEKgjAYRhcVJOUTdLMXEKbTuV1H4X3dy9LfWKmTfzPx7ZPouqvDx_k4KxKqXHLFYimTVObr745TkXMe85RtSJDEIouUYNmOhM49GWN8OSuZBaS4QjWi8XOkJ41A7eBNp1uK4OyIFVDdtrbS3tieNhbp26AfF9-Dnyy-KHR3qGvTPw5k2-jWQfjjnhwv59upiAwAlAMuVZxLwSVjacb_2w8tXTyu</recordid><startdate>201210</startdate><enddate>201210</enddate><creator>Bays, L. R.</creator><creator>Oliveira, R. R.</creator><creator>Buriol, L. S.</creator><creator>Barcellos, M. P.</creator><creator>Gaspary, L. P.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201210</creationdate><title>Security-aware optimal resource allocation for virtual network embedding</title><author>Bays, L. R. ; Oliveira, R. R. ; Buriol, L. S. ; Barcellos, M. P. ; Gaspary, L. P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_63800453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Bandwidth</topic><topic>Cryptography</topic><topic>Resource management</topic><topic>Routing protocols</topic><topic>Substrates</topic><toplevel>online_resources</toplevel><creatorcontrib>Bays, L. R.</creatorcontrib><creatorcontrib>Oliveira, R. R.</creatorcontrib><creatorcontrib>Buriol, L. S.</creatorcontrib><creatorcontrib>Barcellos, M. P.</creatorcontrib><creatorcontrib>Gaspary, L. P.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bays, L. R.</au><au>Oliveira, R. R.</au><au>Buriol, L. S.</au><au>Barcellos, M. P.</au><au>Gaspary, L. P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security-aware optimal resource allocation for virtual network embedding</atitle><btitle>2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm)</btitle><stitle>CNSM</stitle><date>2012-10</date><risdate>2012</risdate><spage>378</spage><epage>384</epage><pages>378-384</pages><issn>2165-9605</issn><isbn>9781467331340</isbn><isbn>1467331341</isbn><eisbn>9783901882487</eisbn><eisbn>3901882480</eisbn><abstract>Network virtualization enables the creation of multiple instances of virtual networks on top of a single physical infrastructure. Given its wide applicability, this technique has attracted a lot of interest both from academic researchers and major companies within the segment of computer networks. Although recent efforts (motivated mainly by the search for mechanisms to evaluate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource allocation with fulfillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. To address this problem, in this paper we propose a virtual network embedding model that satisfies security requirements and, at the same time, optimizes physical resource usage. The results obtained demonstrate that the model is able to correctly and optimally map virtual networks to a physical substrate, minimizing bandwidth costs for infrastructure providers.</abstract><pub>IEEE</pub></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2165-9605
ispartof 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), 2012, p.378-384
issn 2165-9605
language eng
recordid cdi_ieee_primary_6380045
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Bandwidth
Cryptography
Resource management
Routing protocols
Substrates
title Security-aware optimal resource allocation for virtual network embedding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T18%3A41%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security-aware%20optimal%20resource%20allocation%20for%20virtual%20network%20embedding&rft.btitle=2012%208th%20international%20conference%20on%20network%20and%20service%20management%20(cnsm)%20and%202012%20workshop%20on%20systems%20virtualiztion%20management%20(svm)&rft.au=Bays,%20L.%20R.&rft.date=2012-10&rft.spage=378&rft.epage=384&rft.pages=378-384&rft.issn=2165-9605&rft.isbn=9781467331340&rft.isbn_list=1467331341&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E6380045%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783901882487&rft.eisbn_list=3901882480&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6380045&rfr_iscdi=true