The Trust Problem in Modern Network Infrastructures

  • Ludovic Jacquin
  • Antonio Lioy
  • Diego R. Lopez
  • Adrian L. Shaw
  • Tao Su
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 530)

Abstract

SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniques – trustworthy network infrastructure monitoring and remote attestation of virtual machines – useful towards a trusted and secure usage of SDN and NFV.

Keywords

SDN NFV Remote attestation Trust Security 

References

  1. 1.
    Dalton, C., Lioy, A., Lopez, D., Risso, F., Sassu, R.: Exploiting the network for securing personal devices. In: Cleary, F., Felic, M. (eds.) CSP Forum 2014. CCIS, vol. 470, pp. 16–27. Springer, Heidelberg (2014)Google Scholar
  2. 2.
  3. 3.
  4. 4.
    Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th USENIX Security Symposium, pp. 223–238, San Diego, 9–13 August 2004Google Scholar
  5. 5.
    ETSI NFV ISG: NFV Security / Problem Statement. Report ETSI GS NFV-SEC 001 (V1.1.1), October 2014. http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf
  6. 6.
    ETSI NFV ISG: NFV Security / Security and Trust Guidance. Report ETSI GS NFV-SEC 003 (V1.1.1), December 2014. http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf
  7. 7.
    ETSI NFV ISG: NFV / Use Cases. Report ETSI GS NFV 001 (V1.1.1), October 2013. http://www.etsi.org/deliver/etsi_gs/NFV/001_099/001/01.01.01_60/gs_NFV001v010101p.pdf
  8. 8.
  9. 9.
    Jaeger, T., and Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 19–28, Lake Tahoe, 7–9 June 2006Google Scholar
  10. 10.
    Berger, S., Sailer, R., Goldman, K.A.: vTPM: virtualizing the trusted platform module. In: 15th USENIX Security Symposium, Vancouver, pp. 305–320, Canada, July 31–August 8, 2006Google Scholar
  11. 11.
    Goldman, K., Sailer, R., Pendarakis, D., Srinivasan, D.: Scalable integrity monitoring in virtualized environments. In: 5th ACM Workshop on Scalable Trusted Computing, pp. 73–78, Chicago, 4–8 October 2010Google Scholar
  12. 12.
    Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: 19th ACM Symposium on Operating Systems Principles, pp. 164–177, Bolton Landing, 19–22 October 2003Google Scholar
  13. 13.
    Schiffman, J., Vijayakumar, H., Jaeger, T.: Verifying system integrity by proxy. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 179–200. Springer, Heidelberg (2012) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Ludovic Jacquin
    • 1
  • Antonio Lioy
    • 2
  • Diego R. Lopez
    • 3
  • Adrian L. Shaw
    • 1
  • Tao Su
    • 2
  1. 1.Hewlett-Packard LaboratoriesBristolUK
  2. 2.Politecnico di TorinoTorinoItaly
  3. 3.Teléfonica I+DMadridSpain

Personalised recommendations