Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks

被引:0
作者
Wang, Chao [1 ]
Zheng, Danyang [1 ]
Liu, Xiaorong [1 ]
Tang, Wenyi [2 ]
Xu, Honghui [3 ]
Cao, Xiaojun [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
[3] Kennesaw State Univ, Dept Informat Technol, Kennesaw, GA USA
[4] Georgia State Univ, Dept Comp Sci, Atlanta, GA USA
关键词
Security-aware service function chain; Security level estimation; Approximate algorithm; Cost optimization; PLACEMENT;
D O I
10.1016/j.comnet.2024.111002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent cyber-attacks compel service providers to employ security-aware service functions (S-SFs) while delivering network services. Typically, one S-SF can be implemented by diverse configurations, each requiring different implementation costs and providing various security levels. These multi-configured S-SFs could compose various security-aware service function chains (S-SFCs) to satisfy the security requirement of incoming network request. How to properly compose an S-SFC and effectively deploy it remains an open challenging problem. In this work, we discover the "reDundancy security A ccumulatio N "(DAN) phenomenon caused by the direct-summation-fashion when calculating the security level (SeL) of an S-SFC and propose novel methodology to estimate the SeL of one S-SFC for avoiding DAN. To begin, we introduce the concept security level indicator (SeLI) and our novel methodology. Next, we formulate the problem of security-aware SF selection, chaining, and deployment (Sec-SFCD) with the objective function of cost optimization and prove its NP-hardness. To solve this problem, we propose the security-cost-balance (SCB) factor technique, which measures the average cost of satisfying one unit of security requirement. Based on this technique, we further develop an efficient algorithm called SCB-based S-SFC deployment (SCB-SD) and improves it by proposing overflowing security level elimination (OSE) technique. Through our thorough analysis, we show the logarithm approximation of SCB-SD and SCB-SD with OSE technique (SSD-OSE). The extensive simulation results validate SSD-OSE' s logarithm-approximation and demonstrate that it significantly outperforms the benchmarks directly extended from the state-of-the-art by an average of 17.98 % and 67.47 %.
引用
收藏
页数:15
相关论文
共 47 条
  • [1] [Anonymous], Microsoft Azure, https://azure.microsoft.com/en-us/pricing/details/virtual-machines/
  • [2] An Efficient Approximation Algorithm for Service Function Chaining Placement in Edge-Cloud Computing Industrial Internet of Things
    Asgarian, Mina
    Jamshidi, Kamal
    Bohlooli, Ali
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12815 - 12822
  • [3] Azure, 2024, Azure data transfer pricing
  • [4] Observation of a near-threshold enhancement in the p(p)over-bar mass spectrum from radiative J/ψ→γp(p)over-bar deecays -: art. no. 022001
    Bai, JZ
    Ban, Y
    Bian, JG
    Cai, X
    Chang, JF
    Chen, HF
    Chen, HS
    Chen, J
    Chen, J
    Chen, JC
    Chen, YB
    Chi, SP
    Chu, YP
    Cui, XZ
    Dai, YM
    Dai, YS
    Dong, LY
    Du, SX
    Du, ZZ
    Dunwoodie, W
    Fang, J
    Fang, SS
    Fu, CD
    Fu, HY
    Fu, LP
    Gao, CS
    Gao, ML
    Gao, YN
    Gong, MY
    Gong, WX
    Gu, SD
    Guo, YN
    Guo, YQ
    Guo, ZJ
    Han, SW
    Harris, FA
    He, J
    He, KL
    He, M
    He, X
    Heng, YK
    Hong, T
    Hu, HM
    Hu, T
    Huang, GS
    Huang, L
    Huang, XP
    Izen, JM
    Ji, XB
    Jiang, CH
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (02) : 1 - 022001
  • [5] Secure Service Function Chaining in the Context of Zero Trust Security
    Bradatsch, Leonard
    Haeberle, Marco
    Steinert, Benjamin
    Kargl, Frank
    Menth, Michael
    [J]. PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 123 - 131
  • [6] Development of Abraham model correlations for solute transfer into cyclopentanol from both water and the gas phase based on measured solubility ratios
    Cai, Sophia K.
    Huang, Evonne
    Kim, Kelly
    Shanmugam, Neel
    Varadharajan, Advika
    Xu, Angelina
    Acree, William E., Jr.
    [J]. PHYSICS AND CHEMISTRY OF LIQUIDS, 2022, 60 (02) : 287 - 296
  • [7] Chemodanov D, 2019, IEEE INFOCOM SER, P1792, DOI [10.1109/infocom.2019.8737498, 10.1109/INFOCOM.2019.8737498]
  • [8] Distributed Orchestration of Service Function Chains for Edge Intelligence in the Industrial Internet of Things
    Chen, Handi
    Wang, Shupeng
    Li, Guojun
    Nie, Laisen
    Wang, Xiaojie
    Ning, Zhaolong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6244 - 6254
  • [9] A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
    Duo, Wenli
    Zhou, Meng Chu
    Abusorrah, Abdullah
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (05) : 784 - 800
  • [10] A Column Generation Algorithm for Dedicated-Protection O-RAN VNF Deployment
    Duong, Quang Huy
    Tamim, Ibrahim
    Jaumard, Brigitte
    Shami, Abdallah
    [J]. 2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 1206 - 1211