A security-aware service function chain deployment method for load balance and delay optimization

被引:2
|
作者
Zhai, Dong [1 ]
Meng, Xiangru [1 ]
Yu, Zhenhua [2 ]
Hu, Hang [1 ]
Huang, Tao [1 ]
机构
[1] Air Force Engn Univ, Informat & Nav Coll, Xian 710077, Peoples R China
[2] Xian Univ Sci & Technol, Inst Syst Secur & Control, Coll Comp Sci & Technol, Xian 710054, Peoples R China
基金
中国国家自然科学基金;
关键词
EMBEDDING ALGORITHM; NETWORK; PLACEMENT;
D O I
10.1038/s41598-022-14494-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Network function virtualization (NFV) decouples network functions from hardware devices. However, it introduces security challenges due to its reliance on software, which facilitates attacks. This security problem has a significant negative impact on the interests of users. Existing deployment methods are not suitable for SFC requests with a security demand, causing the use of substrate resources unreasonable and lower acceptance ratio. Moreover, a strict delay requirement is another challenge for NFV. To make the use of the substrate resources more reasonable and reduce the transmission delay, this paper proposes a security-constraint and function-mutex-constraint consolidation (SFMC) method for virtual network function (VNF) to reduce resource consumption and transmission delay. In addition, a security-aware service function chain (SASFC) deployment method for load balance and delay optimization is presented, which deploys service function chains according to the consolidated results of the SFMC method. The SASFC method first obtains a candidate server node set using resource, hosting capacity, security and node load constraints. It then obtains candidate paths according to the metric of the minimum transmission delay and link load constraint using the Viterbi algorithm. Finally, the path with the highest VNF security level match degree among the candidate paths is adopted to deploy virtual links, and the corresponding server nodes are employed to deploy VNFs. As a result, the SASFC method makes the use of substrate resources more reasonable. It improves the acceptance ratio and long-term average revenue to cost ratio, reduces transmission delay, and achieves load balancing. Experiment results show that when the number of VNFs is five, the acceptance ratio and long-term average revenue to cost ratio of the SASFC method are close to 0.75 and 0.88, which are higher than those of the compared methods. Its transmission delay and proportion of bottleneck nodes are 7.71 and 0.024, which are lower than those of the compared methods. The simulations demonstrate the effectiveness of the SASFC method.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Security-Aware Service Composition for End Users of Small Enterprises
    Khan, Khaled
    Malluhi, Qutaibah
    [J]. NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2010, 217 : 257 - 267
  • [22] Five tenets of security-aware logistics and supply chain operation
    Russell, DM
    Saldanha, JP
    [J]. TRANSPORTATION JOURNAL, 2003, 42 (04) : 44 - 54
  • [23] SAHARA: A Security-Aware Hazard and Risk Analysis Method
    Macher, Georg
    Sporer, Harald
    Berlach, Reinhard
    Armengaud, Eric
    Kreiner, Christian
    [J]. 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 621 - 624
  • [24] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [25] Security-Aware and Time-Guaranteed Service Placement in Edge Clouds
    Sun, Huaiying
    Yu, Huiqun
    Fan, Guisheng
    Chen, Liqiong
    Liu, Zheng
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 711 - 725
  • [26] CHANGE: Delay-Aware Service Function Chain Orchestration at the Edge
    Wang, Lei
    Dolati, Mahdi
    Ghaderi, Majid
    [J]. 5TH IEEE INTERNATIONAL CONFERENCE ON FOG AND EDGE COMPUTING (ICFEC 2021), 2021, : 19 - 28
  • [27] Automation of service-based security-aware business processes in the Cloud
    Fernando Lins
    Julio Damasceno
    Robson Medeiros
    Erica Sousa
    Nelson Rosa
    [J]. Computing, 2016, 98 : 847 - 870
  • [28] Security-aware Service Migration for Tactical Mobile Micro-Clouds
    Ciftcioglu, Ertugrul N.
    Chan, Kevin S.
    Urgaonkar, Rahul
    Wang, Shiqiang
    He, Ting
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1058 - 1063
  • [29] Makespan and Security-Aware Workflow Scheduling for Cloud Service Cost Minimization
    Li, Liying
    Zhou, Chengliang
    Cong, Peijin
    Shen, Yufan
    Zhou, Junlong
    Wei, Tongquan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 609 - 624
  • [30] Automation of service-based security-aware business processes in the Cloud
    Lins, Fernando
    Damasceno, Julio
    Medeiros, Robson
    Sousa, Erica
    Rosa, Nelson
    [J]. COMPUTING, 2016, 98 (09) : 847 - 870