A Dynamic Service Identity-Based Security Policy Consistency Checking Mechanism in SDN

被引:0
|
作者
Yan, Xincheng [1 ]
Wu, Jianhua [1 ]
Zhou, Na [1 ]
Jiang, Zhihong [1 ]
Zeng, Junsan [2 ]
Yin, Jianhui [2 ,3 ]
Liu, Ying [2 ]
机构
[1] State Key Lab Mobile Network & Mobile Multimedia, Shenzhen, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Peng Cheng Lab, Dept New Networks, Shenzhen, Guangdong, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS | 2024年
关键词
Software-Defined Networking (SDN); Network Functions Virtualization (NFV); Service Function Chaining (SFC); Policy consistency checking; P4; Path verification; NETWORKS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Service Function Chaining (SFC) is the basic business model in a Virtualization of Network Functions (VNF) scenario, which enables the provision of customized network services, including security services such as resiliently deployed stateless firewalls, load balancers, and Intrusion Detection and Prevention Systems (IDPS). However, conflicting security policies during service matching and operation enforcement may lead to problems such as policy inconsistency, forwarding loop, and information leakage. To solve these problems, the paper takes a global view of the SDN controller and configures unique service identifiers and authentication keys for policy enforcers. At the same time, a probabilistic path authentication identifier is inserted for the packet using programming protocol-independent packet processors (P4) language and combined with a symmetric key-based authentication algorithm to realize the policy checking mechanism. In this way, the consistency of the SDN controller security policy can be ensured in terms of both the consistency of the SDN flow table rules and the consistency of the enforced policies in the service function chain. The experimental results show that our mechanism can effectively ensure the consistency of security policies under the premise of ensuring acceptable throughput and delay overhead.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 50 条
  • [1] Security Policy Checking in Distributed SDN based Clouds
    Pisharody, Sandeep
    Chowdhary, Ankur
    Huang, Dijiang
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 19 - 27
  • [2] A Novelty Approach for Checking Consistency of Security Policy
    Liu Changhua
    Li Yaqin
    Liao Zhensong
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 319 - +
  • [3] Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas
    Peng, Su
    Zhou, Fucai
    Li, Jin
    Wang, Qiang
    Xu, Zifeng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 134 : 72 - 88
  • [4] Cloud data integrity checking with an identity-based auditing mechanism from RSA
    Yu, Yong
    Xue, Liang
    Au, Man Ho
    Susilo, Willy
    Ni, Jianbing
    Zhang, Yafang
    Vasilakos, Athanasios V.
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
  • [5] An identity-based security mechanism for P2P VoIP
    Jiang, Hua
    Jia, Yongxing
    Du, Xianru
    Wang, Weizhi
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 481 - +
  • [6] Identity-based cryptography for grid security
    Lim, HW
    Paterson, KG
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
  • [7] Identity-based cryptography for grid security
    Lim, Hoon Wei
    Paterson, Kenneth G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 15 - 32
  • [8] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [9] Survey of security on identity-based cryptography
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
  • [10] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):