An evaluation method for secure virtual network embedding algorithms

Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Computer Virology and Hacking Techniques 2017-11, Vol.13 (4), p.265-270
Hauptverfasser: Kim, Hak Suh, Lee, Sang-Ho
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 270
container_issue 4
container_start_page 265
container_title Journal of Computer Virology and Hacking Techniques
container_volume 13
creator Kim, Hak Suh
Lee, Sang-Ho
description Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.
doi_str_mv 10.1007/s11416-017-0303-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1964626181</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1964626181</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</originalsourceid><addsrcrecordid>eNp1kD1PwzAURS0EElXpD2CzxGzwcxzbGavyUaRKLDBbju20KUlc7KSIf0-qMHRhene45z7pIHQL9B4olQ8JgIMgFCShGc1IcYFmjImMKJlll2f5Gi1S2lNKgeVKinyGHpcd9kfTDKavQ4db3--Cw1WIOHk7RI-PdewH0-DO998hfmLflt65utti02xDrPtdm27QVWWa5Bd_d44-np_eV2uyeXt5XS03xGYgelIK40BZq4SHAnIhLS9LVuWuKjxzFWN5bpRS1DDrrOOS5wWTVnFTAHOcVtkc3U27hxi-Bp96vQ9D7MaXGgrBBROgYGzB1LIxpBR9pQ-xbk380UD1yZeefOnRlz750sXIsIlJY7fb-ni2_C_0C2FAbTY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1964626181</pqid></control><display><type>article</type><title>An evaluation method for secure virtual network embedding algorithms</title><source>SpringerNature Journals</source><source>Alma/SFX Local Collection</source><creator>Kim, Hak Suh ; Lee, Sang-Ho</creator><creatorcontrib>Kim, Hak Suh ; Lee, Sang-Ho</creatorcontrib><description>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</description><identifier>ISSN: 2263-8733</identifier><identifier>EISSN: 2263-8733</identifier><identifier>DOI: 10.1007/s11416-017-0303-9</identifier><language>eng</language><publisher>Paris: Springer Paris</publisher><subject>Algorithms ; Computer Science ; Computer simulation ; Infrastructure ; Original Paper ; Resource allocation ; Virtual networks</subject><ispartof>Journal of Computer Virology and Hacking Techniques, 2017-11, Vol.13 (4), p.265-270</ispartof><rights>Springer-Verlag France SAS 2017</rights><rights>Copyright Springer Science &amp; Business Media 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</citedby><cites>FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11416-017-0303-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11416-017-0303-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kim, Hak Suh</creatorcontrib><creatorcontrib>Lee, Sang-Ho</creatorcontrib><title>An evaluation method for secure virtual network embedding algorithms</title><title>Journal of Computer Virology and Hacking Techniques</title><addtitle>J Comput Virol Hack Tech</addtitle><description>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Infrastructure</subject><subject>Original Paper</subject><subject>Resource allocation</subject><subject>Virtual networks</subject><issn>2263-8733</issn><issn>2263-8733</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kD1PwzAURS0EElXpD2CzxGzwcxzbGavyUaRKLDBbju20KUlc7KSIf0-qMHRhene45z7pIHQL9B4olQ8JgIMgFCShGc1IcYFmjImMKJlll2f5Gi1S2lNKgeVKinyGHpcd9kfTDKavQ4db3--Cw1WIOHk7RI-PdewH0-DO998hfmLflt65utti02xDrPtdm27QVWWa5Bd_d44-np_eV2uyeXt5XS03xGYgelIK40BZq4SHAnIhLS9LVuWuKjxzFWN5bpRS1DDrrOOS5wWTVnFTAHOcVtkc3U27hxi-Bp96vQ9D7MaXGgrBBROgYGzB1LIxpBR9pQ-xbk380UD1yZeefOnRlz750sXIsIlJY7fb-ni2_C_0C2FAbTY</recordid><startdate>20171101</startdate><enddate>20171101</enddate><creator>Kim, Hak Suh</creator><creator>Lee, Sang-Ho</creator><general>Springer Paris</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20171101</creationdate><title>An evaluation method for secure virtual network embedding algorithms</title><author>Kim, Hak Suh ; Lee, Sang-Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-b6ad18cc86e191567c4bb2f5df9e2df2255a8880a2cdcd4745927c84a912d40f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Infrastructure</topic><topic>Original Paper</topic><topic>Resource allocation</topic><topic>Virtual networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Hak Suh</creatorcontrib><creatorcontrib>Lee, Sang-Ho</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Hak Suh</au><au>Lee, Sang-Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An evaluation method for secure virtual network embedding algorithms</atitle><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle><stitle>J Comput Virol Hack Tech</stitle><date>2017-11-01</date><risdate>2017</risdate><volume>13</volume><issue>4</issue><spage>265</spage><epage>270</epage><pages>265-270</pages><issn>2263-8733</issn><eissn>2263-8733</eissn><abstract>Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.</abstract><cop>Paris</cop><pub>Springer Paris</pub><doi>10.1007/s11416-017-0303-9</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2263-8733
ispartof Journal of Computer Virology and Hacking Techniques, 2017-11, Vol.13 (4), p.265-270
issn 2263-8733
2263-8733
language eng
recordid cdi_proquest_journals_1964626181
source SpringerNature Journals; Alma/SFX Local Collection
subjects Algorithms
Computer Science
Computer simulation
Infrastructure
Original Paper
Resource allocation
Virtual networks
title An evaluation method for secure virtual network embedding algorithms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T13%3A32%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20evaluation%20method%20for%20secure%20virtual%20network%20embedding%20algorithms&rft.jtitle=Journal%20of%20Computer%20Virology%20and%20Hacking%20Techniques&rft.au=Kim,%20Hak%20Suh&rft.date=2017-11-01&rft.volume=13&rft.issue=4&rft.spage=265&rft.epage=270&rft.pages=265-270&rft.issn=2263-8733&rft.eissn=2263-8733&rft_id=info:doi/10.1007/s11416-017-0303-9&rft_dat=%3Cproquest_cross%3E1964626181%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1964626181&rft_id=info:pmid/&rfr_iscdi=true