Advertisement

Security Requirements in a Federated Cloud Networking Architecture

  • Philippe Massonet
  • Anna Levin
  • Antonio Celesti
  • Massimo Villari
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 567)

Abstract

Cloud federation enables cloud providers to collaborate in order to create a large pool of virtual resources at multiple network locations. Different types of federated cloud architectures have been proposed and implemented up to now. In this context, an effective, agile and secure federation of cloud networking resources is a key aspect for the deployment of federated applications. This paper presents the preliminary security requirements analyzed in the H2020 BEACON Project that aims at researching techniques to federate cloud network resources and defining an integrated cloud management layer that enables an efficient and secure deployment of federated cloud applications. The paper analyses both how to protect the cloud networking infrastructure, and how cloud users can customize the network security for their distributed applications.

Keywords

Cloud computing Federation SDN NFV Security 

Notes

Acknowledgment

This research was supported by the European Union’s Horizon 2020 Research and Innovation Programme Project BEACON under Grant Agreement No. 644048.

References

  1. 1.
    Giacobbe, M., Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Towards energy management in cloud federation: a survey in the perspective of future sustainable and cost-saving strategies. Comput. Netw. 91, 438–452 (2015)CrossRefGoogle Scholar
  2. 2.
    Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)CrossRefGoogle Scholar
  3. 3.
    Mulfari, D., Celesti, A., Villari, M.: A computer system architecture providing a user-friendly man machine interface for accessing assistive technology in cloud computing. J. Syst. Softw. 100, 129–138 (2015)CrossRefGoogle Scholar
  4. 4.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: How the dataweb can support cloud federation: service representation and secure data exchange. In: 2012 Second Symposium on Network Cloud Computing and Applications (NCCA), pp. 73–79 (2012)Google Scholar
  5. 5.
    Panarello, A., Celesti, A., Fazio, M., Villari, M., Puliafito, A.: A requirementsanalysis for IaaS cloud federation. In: Proceedings of the 4th International Conference on Cloud Computing and Services Science, pp. 584–589 (2014). doi: 10.5220/0004945705840589. ISBN:978-989-758-019-2
  6. 6.
    Carrozza, G., Manetti, V., Marotta, A., Canonico, R., Avallone, S.: Exploiting SDN approach to tackle cloud computing security issues in the ATC scenario. In: Vieira, M., Cunha, J.C. (eds.) EWDC 2013. LNCS, vol. 7869, pp. 54–60. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  7. 7.
    Celesti, A., Fazio, M., Villari, M.: Se clever: a secure message oriented middleware for cloud federation. In: IEEE Symposium on Computers and Communications (ISCC), pp. 35–40 (2013)Google Scholar
  8. 8.
    Celesti, A., Fazio, M., Villari, M., Puliafito, A., Mulfari, D.: Remote and deep attestations to mitigate threats in cloud mash-up services. In: World Congress on Computer and Information Technology (WCCIT), pp. 1–6 (2013)Google Scholar
  9. 9.
    Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1–7 (2013)Google Scholar
  10. 10.
    Hu, Z., Wang, M., Yan, X., Yin, Y., Luo, Z.: A comprehensive security architecture for SDN. In: 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 30–37 (2015)Google Scholar
  11. 11.
    Zaalouk, A., Khondoker, R., Marx, R., Bayarou, K.: Orchsec: an orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions. In: IEEE Network Operations and Management Symposium (NOMS), pp. 1–9 (2014)Google Scholar
  12. 12.
    Bernardo, D., Chua, B.B.: Introduction and analysis of SDN and NFV security architecture (SN-SECA). In: IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 796–801 (2015)Google Scholar
  13. 13.
    Seeber, S., Rodosek, G.: Improving network security through SDN in cloud scenarios. In: 10th International Conference on Network and Service Management (CNSM), pp. 376–381 (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Philippe Massonet
    • 1
  • Anna Levin
    • 2
  • Antonio Celesti
    • 3
  • Massimo Villari
    • 3
  1. 1.CeticCharleroiBelgium
  2. 2.HLRIBM HaifaHaifaIsrael
  3. 3.DICIEAMAUniversity of MessinaMessinaItaly

Personalised recommendations