A Dynamic Service Identity-Based Security Policy Consistency Checking Mechanism in SDN

被引:0
|
作者
Yan, Xincheng [1 ]
Wu, Jianhua [1 ]
Zhou, Na [1 ]
Jiang, Zhihong [1 ]
Zeng, Junsan [2 ]
Yin, Jianhui [2 ,3 ]
Liu, Ying [2 ]
机构
[1] State Key Lab Mobile Network & Mobile Multimedia, Shenzhen, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Peng Cheng Lab, Dept New Networks, Shenzhen, Guangdong, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS | 2024年
关键词
Software-Defined Networking (SDN); Network Functions Virtualization (NFV); Service Function Chaining (SFC); Policy consistency checking; P4; Path verification; NETWORKS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Service Function Chaining (SFC) is the basic business model in a Virtualization of Network Functions (VNF) scenario, which enables the provision of customized network services, including security services such as resiliently deployed stateless firewalls, load balancers, and Intrusion Detection and Prevention Systems (IDPS). However, conflicting security policies during service matching and operation enforcement may lead to problems such as policy inconsistency, forwarding loop, and information leakage. To solve these problems, the paper takes a global view of the SDN controller and configures unique service identifiers and authentication keys for policy enforcers. At the same time, a probabilistic path authentication identifier is inserted for the packet using programming protocol-independent packet processors (P4) language and combined with a symmetric key-based authentication algorithm to realize the policy checking mechanism. In this way, the consistency of the SDN controller security policy can be ensured in terms of both the consistency of the SDN flow table rules and the consistency of the enforced policies in the service function chain. The experimental results show that our mechanism can effectively ensure the consistency of security policies under the premise of ensuring acceptable throughput and delay overhead.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 50 条
  • [21] Circular and KDM Security for Identity-Based Encryption
    Alperin-Sheriff, Jacob
    Peikert, Chris
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 334 - 352
  • [22] An identity-based grid security infrastructure model
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 314 - 325
  • [23] An Identity-Based Security Infrastructure for Cloud Environments
    Schridde, Christian
    Doernemann, Tim
    Juhnke, Ernst
    Freisleben, Bernd
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
  • [24] Strong Forward Security in Identity-Based Signcryption
    Muniz, Madeline Gonzalez
    Laud, Peeter
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 235 - 258
  • [25] Security of an identity-based cryptosystem and the related reductions
    Okamoto, T
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
  • [26] ZigBee security using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
  • [27] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [28] Security Analysis of An Identity-Based Mix Net
    Yajam, Habib Allah
    Mahmoodi, Ali
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [29] An identity-based model for grid security infrastructure
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 258 - 266
  • [30] Risk and avoidance strategy for blocking mechanism of SDN-based security service
    Byun, Minjae
    Lee, Yongjun
    Choi, Jin-Young
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 187 - 190