Security Orchestrator Introducing a Security Orchestrator in the context of the ETSI NFV Reference Architecture

被引:44
|
作者
Jaeger, Bernd [1 ]
机构
[1] Nokia Networks, Secur Res, Munich, Germany
关键词
Security Orchestrator; Network Function Virtualization; Telco Cloud;
D O I
10.1109/Trustcom.2015.514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
During the last two years, the ETSI NFV Management and Orchestration (MANO) working group has defined the ETSI NFV Reference Architecture. Network Function Virtualization (NFV) means the virtualization of telco network elements intending to get away from specialized or proprietary network appliances by leveraging standard IT virtualization technologies (clouds). One main intention of ETSI NFV MANO is controlling the NFV environment as much as possible through automation and orchestration. As security is a key requirement of virtual networking in the context of NFV environments, the same principles should apply to security management in ETSI NFV. Therefore it is proposed introducing a Security Orchestrator to meet this requirement. This paper describes the ETSI NFV Reference Architecture enhanced by the Security Orchestrator as well as the interworking of the Security Orchestrator with the already defined ETSI NFV orchestration and management entities like the NFV Orchestrator, the VNF Manager(s), the Element Manager(s) and the Virtual Infrastructure Manager(s). Additionally it defines the security orchestration tasks as well as the interfaces required to interact with the existing ETSI NFV Reference Architecture.
引用
收藏
页码:1255 / 1260
页数:6
相关论文
共 50 条
  • [42] Design a Software Reference Architecture to Enhance Privacy and Security in Electronic Health Records
    Tertulino, Rodrigo
    Ivaki, Naghmeh
    Morais, Higor
    IEEE ACCESS, 2024, 12 : 112157 - 112179
  • [43] The Security-Development Nexus and the Imperative of Peacebuilding with special Reference to the African Context
    Neethling, Thea
    AFRICAN JOURNAL ON CONFLICT RESOLUTION, 2005, 5 (01) : 33 - 60
  • [44] A goal question metric approach for evaluating security in a service oriented architecture context
    Kassou, Meryem
    Kjiri, Laila
    International Journal of Computer Science Issues, 2012, 9 (4 4-1): : 238 - 249
  • [45] Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security
    Javadpour, Amir
    Ja'fari, Forough
    Taleb, Tarik
    Benzaid, Chafika
    Bin, Yang
    Zhao, Yue
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39744 - 39766
  • [46] The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
    Homoliak, Ivan
    Venugopalan, Sarad
    Reijsbergen, Daniel
    Hum, Qingze
    Schumi, Richard
    Szalachowski, Pawel
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 341 - 390
  • [47] Reference Security Management Architecture - Guiding governmental and military Inter-Cloud initiatives
    Kretzschmar, Michael
    Knuepfer, Marcus
    2011 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2011,
  • [48] Architecture of context-aware integrated security management systems for smart home environment
    Park, Seon-Ho
    Cho, Joon-Sic
    Jung, Sung-Min
    Han, Young-Ju
    Chung, Tai-Myoung
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 102 - +
  • [49] Information Security Architecture-Context Aware Access Control Model for Educational Applications
    DuraiPandian, N.
    Shanmughaneethi, V.
    Chellappan, C.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (12): : 197 - 204
  • [50] An Architecture for Providing Context-Aware Security as a Service in Mobile Cloud Computing Environments
    Alkubati, Muaamar Amer
    Aljunid, Syed Ahmad
    Ismail, Normaly Kamal
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11074 - 11077