Security-Oriented Network Slice Backup Method

被引:0
|
作者
Chen, Ke [1 ]
Wang, Ying [1 ]
Yu, Peng [1 ]
Li, Naling [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
5G slice; reliability; safety; backup;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G realizes flexible networking by building network slices, and its realization depends on network function virtualization (NFV) technology, which combines different types of virtual network functions (VNFs) to provide network services. The reliability of VNFs is lower than that of traditional hardware due to the risk of both software and hardware failure, and redundant backup is an effective solution. Meanwhile, from the security point of view, because the 5G network is based on the unified and standardized hardware of the industry, the need for isolation is put forward. Current research on VNF reliability assurance has not considered the special isolation requirements of 5G. In this paper, aiming to guarantee the safety demand as well as minimize backup resource to meet the reliability target, we formalize the safety-oriented backup problem for 5G core network slices and propose a backup algorithm based on isolation (BABI). Simulation results show that the introduction of isolation can double the security of slices. The comparison with the existing backup methods shows that under the same isolation constraint, the proposed approach can achieve a less resource consumption by 60% - 80% and a improvement of the proportion of effective resources by 40% - 80%.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 50 条
  • [1] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] A Security-oriented Dynamic and Heterogeneous Scheduling Method for Virtual Network Function
    Ji Xinsheng
    Xu Shuiling
    Liu Wenyan
    Tong Qing
    Li Lingshu
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (10) : 2435 - 2441
  • [3] Research on the Key Technologies of Network Security-Oriented Situation Prediction
    Zhu, Yikun
    Du, Zhiling
    [J]. SCIENTIFIC PROGRAMMING, 2021, 2021
  • [4] Security-oriented service composition and evolution
    Han, Jun
    Kowalczyk, Ryszard
    Khan, Khaled M.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 71 - 78
  • [5] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [6] Improving Perimeter Security with Security-oriented Program Transformations
    Hafiz, Munawar
    Johnson, Ralph E.
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 61 - 67
  • [7] Security-oriented sensor placement in intelligent buildings
    Eliades, D. G.
    Michaelides, M. P.
    Panayiotou, C. G.
    Polycarpou, M. M.
    [J]. BUILDING AND ENVIRONMENT, 2013, 63 : 114 - 121
  • [8] SOMR: Towards a Security-Oriented MapReduce Infrastructure
    Zhao, Rui
    Meng, Zhaopeng
    Zheng, Yan
    Jin, Qiangguo
    Ruan, Anbang
    Xie, Hanglun
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 530 - 537
  • [9] Behavioral Equivalence of Security-Oriented Interactive Systems
    Liu, Guanjun
    Jiang, Changjun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08) : 2061 - 2068
  • [10] A Security-oriented Workflow Framework for Collaborative Environments
    Hussain, Sardar
    Sinnott, Richard O.
    Poet, Ron
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 707 - 714