dc.contributor.author | Marku, Enio | |
dc.contributor.author | Biczok, Gergely | |
dc.contributor.author | Boyd, Colin Alexander | |
dc.date.accessioned | 2021-10-26T07:35:07Z | |
dc.date.available | 2021-10-26T07:35:07Z | |
dc.date.created | 2021-01-14T23:38:01Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | IEEE Communications Magazine. 2020, 58 (7), 72-77. | en_US |
dc.identifier.issn | 0163-6804 | |
dc.identifier.uri | https://hdl.handle.net/11250/2825530 | |
dc.description.abstract | It is becoming increasingly common for enterprises to outsource network functions to a third party provider such as a public cloud. Besides its well documented benefits in cost and flexibility, outsourcing also introduces security issues. Peeking into or modifying traffic destined to the cloud are not the only threats we have to deal with; it can also be desirable to protect VNF code, input policies, and states from a malicious cloud provider. In recent years several solutions have been proposed toward mitigating the threats of outsourcing VNFs, using either cryptographic or trusted hardware- based mechanisms (the latter typically applying SGX). In this article, we provide an overview of methods for protecting the security of outsourced network functions. We introduce the challenges and emerging requirements, analyze the state of the art, and identify the gaps between the requirements and existing solutions. Furthermore, we outline a potential way to fill these gaps in order to devise a more complete solution. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.title | Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | © IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
dc.source.pagenumber | 72-77 | en_US |
dc.source.volume | 58 | en_US |
dc.source.journal | IEEE Communications Magazine | en_US |
dc.source.issue | 7 | en_US |
dc.identifier.doi | 10.1109/MCOM.001.1900724 | |
dc.identifier.cristin | 1871715 | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 2 | |