Multi-Tenancy Cloud-Enabled Small Cell Security

被引:0
|
作者
Abubakar, Babangida Albaba [1 ]
Mouratidis, Haralambos [2 ]
机构
[1] Umaru Musa Yaradua Univ, Dept Math & Comp Sci, Katsina, Katsina State, Nigeria
[2] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
关键词
5G; CESC; Virtualization; NFV; SecTro; SESAME; Light Data Centre; NFVO; Northbound Interface;
D O I
10.1109/nigeriacomputconf45974.2019.8949667
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network's edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing. The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.
引用
收藏
页码:257 / 262
页数:6
相关论文
共 50 条
  • [41] Multi-Tenancy Multi-Target (MT2): A SaaS Architecture for the Cloud
    Rico Ortega, Antonio
    Noguera, Manuel
    Luis Garrido, Jose
    Benghazi, Kawtar
    Chung, Lawrence
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2012, 2012, 112 : 214 - 227
  • [42] Multi-tenancy for Virtualized Network Functions
    Medhat, Ahmed M.
    Carella, Giuseppe
    Mwangama, Joyce
    Ventura, Neco
    2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [43] XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments
    Ayache, Meryeme
    Gawanmeh, Amjad
    Al-Karaki, Jamal N.
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1872 - 1878
  • [44] Multi-Tenancy in Smart City Platforms
    Nikolaou, Ioannis
    Anthopoulos, Leonidas
    COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2022, WWW 2022 COMPANION, 2022, : 1266 - 1270
  • [45] Feasibility of Multi-Tenancy on Intermittent Power
    Patoukas, Dimitris
    Yildirim, Kasim Sinan
    Majid, Amjad Yousef
    Hester, Josiah
    Pawelczak, Przemyslaw
    PROCEEDINGS OF THE 2018 INTERNATIONAL WORKSHOP ON ENERGY HARVESTING & ENERGY-NEUTRAL SENSING SYSTEMS (ENSSYS '18), 2018, : 26 - 31
  • [46] Access Control for Multi-tenancy in Cloud-based Health Information Systems
    Anwar, Mohd
    Imran, Ashiq
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 104 - 110
  • [47] Cloud-aware power control for cloud-enabled small cells
    Mach, Pavel
    Becvar, Zdenek
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1038 - 1043
  • [48] Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing
    Zhang, Kun
    Li, Qingzhong
    Shi, Yuliang
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 376 - +
  • [49] Design Role-Based Multi-Tenancy Access Control Scheme for Cloud Services
    Yang, Shin-Jer
    Lai, Pei-Ci
    Lin, Jyhjong
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 273 - 279
  • [50] SwitchVM: Multi-Tenancy for In-Network Computing
    Khashab, Sajy
    Silberstein, Mark
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, SYSTOR 2023, 2023, : 148 - 148