Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has ...become an emerging issue as network manager eventually encounter its data protection, vulnerability during information exchange on the cloud system. We can protect our data from unwanted access on a hybrid cloud through controlling the respective firewall of the network. But, the firewall has already proved its weakness as it is unable to ensure multi-layered, secured accessibility of the cloud network. Efficient packet utilization sometimes causes high response time in accessing hybrid cloud. In this paper, a Cloud Model with Hybrid functionality and a secure Fuzzy Integrated Firewall for that Hybrid Cloud is proposed and thereby evaluated for the performance in traffic response. Experimental result illustrated that having a fuzzified firewall gives high point-to-point packet utilization decreasing the response time than a conventional firewall. Results from this research work will highly be implemented in transplanting artificial intelligence in future Internet of Things (IoT).
Software Defined Networking (SDN) is the best choice in establishing a software controlled inter-domain network. Convergence of different Wireless link technologies bring the mobile users to choose ...the network being in any geographical location. IEEE 802.21 is such a standard for exchanging networking information for connecting with the network being at any region in the world. Integrated with SDN wireless network this functionality of IEEE 802.21 standard can discover programmable network services with profound resource utilization. However, the information exchange should circulate through a reliable source. Hence, the security analysis of IEEE 802.21 Media Independent Handover (MIH) mechanism for Software Defined Wireless Network (SDWN) is the primary concern of this research work. This study, conducts architectural and functional analysis of MIH integrated with SDWN interface for mobility management of the wireless nodes. The outcome specifies a possible integration with future deployment opportunities in information exchange of IEEE 802.21 MIH for programmable network devices.
The concept of network slicing plays a thriving role as 5G rolls out business models vouched by different stakeholders. The dynamic and variable characterization of end-to-end cloud-network slices ...encompasses the composition of different slice parts laying at different administrative domains. Following a profit-maximizing Slice-as-a-Service (SaaS) model, such a multi-domain facet offers promising business opportunities in support of diverse vertical industries, rendering to network slicing marketplace members the roles of Infrastructure Provider, Slice Provider, and Tenants. The effective realization of SaaS approaches introduces a dynamic resource allocation problem, manifested as challenging run-time decisions upon on-demand slice part requests. The Orchestrator is hence responsible to perform an optimized decision on-the-fly on which elasticity requests to address based on an orchestration policy defined within the context of Network Slice architecture for the followed revenue model. This paper presents a slice management strategy for such an orchestrator can follow, based on reinforcement learning, able to efficiently orchestrate slice elasticity requests to comprehend the maximum revenue for the stakeholders of end-to-end network slice lifecycle. The proposed strategy orients a Slice Orchestrator to learn which slice requests to address as per availability of the required resources at the different participating Infrastructure Providers. The experimental results show the Reinforcement Learning based Orchestrator outperforms several benchmark heuristics focused on revenue maximization.
Dynamic end-to-end cloud network slices following a Slice-as-a-Service (SaaS) paradigm offer promising opportunities in support of diverse vertical industries attached to different administrative ...domains. This paper presents a distributed Marketplace model to dynamically create cloud network slices involving different slice resource providers. Portrayed through the lens of three reference use case scenarios, we discuss potential attributes of having a Marketplace and the outcomes feeding the use case requirements within a Slice Marketplace scope. Effective selection, negotiation, and proper monitoring and enforcement of service level agreements between multiple administrative and technological domains are among the prime challenges towards the realization of a distributed Marketplace of federated network and cloud resource providers.
Software Defined Networking (SDN) is getting much attention for larger network implementation adding programmable feature in the network plane. Demand of wireless networking features is growing ...simultaneously. With increased network complexity and sizes, security has become an issue as vulnerabilities are still prominent for such complex network and needs to be monitored properly to provide early detection of security breaches and Denial of Service attack. Therefore, the communication protocols, an SDN architecture uses including OpenFlow, NETCONF, OpFlex and BGP etc. should be secure enough to manage such complex and large network. This paper analyzes mostly used protocols specifically for Software Defined Wireless Networking (SDWN): BGP, NETCONF, for underlying cloud or data center environment by applying Microsofts STRIDE security threat model. This work represents a comparative study among these most used protocols and holds appropriate network for their deployment.
Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has ...become an emerging issue as network manager eventually encounter its data protection, vulnerability during information exchange on the cloud system. We can protect our data from unwanted access on a hybrid cloud through controlling the respective firewall of the network. But, the firewall has already proved its weakness as it is unable to ensure multi-layered, secured accessibility of the cloud network. Efficient packet utilization sometimes causes high response time in accessing hybrid cloud. In this paper, a Cloud Model with Hybrid functionality and a secure Fuzzy Integrated Firewall for that Hybrid Cloud is proposed and thereby evaluated for the performance in traffic response. Experimental result illustrated that having a fuzzified firewall gives high point-to-point packet utilization decreasing the response time than a conventional firewall. Results from this research work will highly be implemented in transplanting artificial intelligence in future Internet of Things (IoT).
Cloud network slicing can be defined as the process that enables isolated end-to-end and on-demand networking abstractions, which: (a) contain both cloud and network resources, and (b) are ...independently controlled, managed and orchestrated. This paper contributes to the vision of the NECOS project and relevant platform, that aim to address the limitations of current cloud computing infrastructures to accomplish the challenging requirements of the slicing approach. The NECOS platform implements the Slice-as-a-Service model, enabling the dynamic creation of end-to-end (E2E) slices from a set of constituent slice parts contributed from multiple domains. A challenging issue is to define the facility that implements dynamic slice resource discovery, aligned to the requirements of the slice owner or tenant, over different infrastructure providers. Here, we propose a Marketplace-based approach implementing relevant federated interactions for the resource discovery and we detail its architecture, workflows, and information model. We also present its initial implementation details and provide both quantitative and qualitative experimental results validating its main operation.
Today's mobile and wireless network are growing faster in size and complex to measure the services. Security is one of the most important aspects for such complex network and needs to be monitored ...properly to provide early detection of security breaches and Denial of Service attack. Tools that measure such detection of network threats and monitors network services requires internal security in their own mechanism. This paper analyzes two of such monitoring and measurement tools: sFlow and FlowVisor for underlying Software Defined Wireless Networking (SDWN) environment by applying STRIDE threat model. This analytical study represents that, sFlow requires an external secure deployment environment to ensure security in data flow and data store for SDWN. FlowVisor comes with secured access control in data store wherein isolated flow slice requires mechanism that improve its security.