Multi-Tenancy Cloud-Enabled Small Cell Security

被引:0
|
作者
Abubakar, Babangida Albaba [1 ]
Mouratidis, Haralambos [2 ]
机构
[1] Umaru Musa Yaradua Univ, Dept Math & Comp Sci, Katsina, Katsina State, Nigeria
[2] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
关键词
5G; CESC; Virtualization; NFV; SecTro; SESAME; Light Data Centre; NFVO; Northbound Interface;
D O I
10.1109/nigeriacomputconf45974.2019.8949667
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network's edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing. The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.
引用
下载
收藏
页码:257 / 262
页数:6
相关论文
共 50 条
  • [11] Cloud Data Services: Workloads, Architectures and Multi-Tenancy
    Narasayya, Vivek
    Chaudhuri, Surajit
    FOUNDATIONS AND TRENDS IN DATABASES, 2021, 10 (01): : 1 - 107
  • [12] Multi-tenancy authorization models for collaborative cloud services
    Tang, Bo
    Sandhu, Ravi
    Li, Qi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (11): : 2851 - 2868
  • [13] Multi-Tenancy Authorization Models for Collaborative Cloud Services
    Tang, Bo
    Sandhu, Ravi
    Li, Qi
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2013, : 132 - 138
  • [14] Secure Logical Isolation for Multi-tenancy in Cloud Storage
    Factor, Michael
    Hadas, David
    Hamama, Aner
    Har'el, Nadav
    Kolodner, Elliot K.
    Kurmus, Anil
    Shulman-Peleg, Alexandra
    Sorniotti, Alessandro
    2013 IEEE 29TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2013,
  • [15] An A-RBAC Mechanism for a Multi-Tenancy Cloud Environment
    Yang, Ta-Chih
    Guo, Ming-Huang
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [16] Towards a Multi-tenancy aware Cloud Service Composition
    Sellami, Wael
    Kacem, Hatem Hadj
    Kacem, Ahmed Hadj
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 404 - 409
  • [17] Toward a Multi-Tenancy Authorization System for Cloud Services
    Calero, Jose M. Alcaraz
    Edwards, Nigel
    Kirschnick, Johannes
    Wilcock, Lawrence
    Wray, Mike
    IEEE SECURITY & PRIVACY, 2010, 8 (06) : 48 - 55
  • [18] Enhanced Cloud Patterns: A Case Studyof Multi-tenancy Patterns
    Adewojo, A. A.
    Bass, J. M.
    Allison, I. K.
    INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 53 - 58
  • [19] Cloud Computing Security Risks with Authorization Access for Secure Multi-Tenancy Based on AAAS Protocol
    Abd, Sura Khalil
    Salih, Rawia Tahrir
    Al-Haddad, S. A. R.
    Hashim, Fazirulhisyam
    Abdullah, Azizol B. H. J.
    Yussof, Salman
    TENCON 2015 - 2015 IEEE REGION 10 CONFERENCE, 2015,
  • [20] Measuring security risk in the cloud-enabled enterprise
    Leitold, Ferenc
    Hadarics, Kalman
    PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 62 - 66