Show simple item record

dc.contributor.authorMarku, Enio
dc.contributor.authorBiczok, Gergely
dc.contributor.authorBoyd, Colin Alexander
dc.date.accessioned2021-10-26T07:35:07Z
dc.date.available2021-10-26T07:35:07Z
dc.date.created2021-01-14T23:38:01Z
dc.date.issued2020
dc.identifier.citationIEEE Communications Magazine. 2020, 58 (7), 72-77.en_US
dc.identifier.issn0163-6804
dc.identifier.urihttps://hdl.handle.net/11250/2825530
dc.description.abstractIt is becoming increasingly common for enterprises to outsource network functions to a third party provider such as a public cloud. Besides its well documented benefits in cost and flexibility, outsourcing also introduces security issues. Peeking into or modifying traffic destined to the cloud are not the only threats we have to deal with; it can also be desirable to protect VNF code, input policies, and states from a malicious cloud provider. In recent years several solutions have been proposed toward mitigating the threats of outsourcing VNFs, using either cryptographic or trusted hardware- based mechanisms (the latter typically applying SGX). In this article, we provide an overview of methods for protecting the security of outsourced network functions. We introduce the challenges and emerging requirements, analyze the state of the art, and identify the gaps between the requirements and existing solutions. Furthermore, we outline a potential way to fill these gaps in order to devise a more complete solution.en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.titleSecuring Outsourced VNFs: Challenges, State of the Art, and Future Directionsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.source.pagenumber72-77en_US
dc.source.volume58en_US
dc.source.journalIEEE Communications Magazineen_US
dc.source.issue7en_US
dc.identifier.doi10.1109/MCOM.001.1900724
dc.identifier.cristin1871715
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record