Multi-Tenancy Cloud-Enabled Small Cell Security

被引:0
|
作者
Abubakar, Babangida Albaba [1 ]
Mouratidis, Haralambos [2 ]
机构
[1] Umaru Musa Yaradua Univ, Dept Math & Comp Sci, Katsina, Katsina State, Nigeria
[2] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
关键词
5G; CESC; Virtualization; NFV; SecTro; SESAME; Light Data Centre; NFVO; Northbound Interface;
D O I
10.1109/nigeriacomputconf45974.2019.8949667
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network's edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing. The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.
引用
收藏
页码:257 / 262
页数:6
相关论文
共 50 条
  • [31] Multi-Tenancy in Decentralised IoT
    Cherrier, Sylvain
    Movahedi, Zahra
    Ghamri-Doudane, Yacine M.
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 256 - 261
  • [32] Multi-tenancy aware configurable Service Discovery approach in Cloud Computing
    Hajlaoui, Jalel Eddine
    Omri, Mohamed Nazih
    Benslimane, Djamal
    2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 232 - 237
  • [33] QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud
    Madi, Taous
    Zhang, Mengyuan
    Jarraya, Yosr
    Alimohammadifar, Amir
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 163 - 170
  • [34] Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments
    Ayache, Meryeme
    Erradi, Mohammed
    Freisleben, Bernd
    Khoumsi, Ahmed
    CCSW'16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP, 2016, : 55 - 59
  • [35] Interlocking IT/OT security for edge cloud-enabled manufacturing
    Kampa, Thomas
    Mueller, Christian Klaus
    Grossmann, Daniel
    AD HOC NETWORKS, 2024, 154
  • [36] An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
    Dey, Himel
    Islam, Rifat
    Arif, Hossain
    2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), 2019, : 502 - 506
  • [37] Improved scheduling of virtual machines on cloud with multi-tenancy and resource heterogeneity
    Khan, Adeel Ahmed
    Khan, Mohsin
    Ahmed, Waseem
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 815 - 819
  • [38] Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments
    Laskawiec, Sebastian
    Choras, Michal
    IMAGE PROCESSING AND COMMUNICATIONS CHALLENGES 8, 2017, 525 : 270 - 277
  • [39] Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach
    Kumar, Pawan
    Kumar Bhatt, Ashutosh
    IET COMMUNICATIONS, 2020, 14 (18) : 3212 - 3222
  • [40] Security Techniques for Multi Tenancy Applications in Cloud
    Nagarjuna
    Srinivas, C. C. Kalyan
    Sajida, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (08): : 80 - 83