Securing Virtual Machine Orchestration with Blockchains

被引:0
|
作者
Bozic, Nikola [1 ,2 ]
Pujolle, Guy [2 ]
Secci, Stefano [2 ]
机构
[1] SQUAD, Paris, France
[2] UPMC Univ Paris 06, Sorbonne Univ, UMR 7606, LIP6, Paris, France
来源
2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2017年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in progress, the VMOA blockchain, to secure virtual machine orchestration operations for cloud computing and network functions virtualization systems. Using tutorial examples, we describe our design choices and draw implementation plans.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Optimal and Cost Efficient Algorithm for Virtual CDN Orchestration
    Khedher, Hatem
    Abd-Elrahman, Emad
    Afifi, Hossam
    Marot, Michel
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 61 - 69
  • [42] Virtual authentication ring for securing network operations
    Li, Na
    Lee, David
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 323 - 335
  • [43] XNetMon: A Network Monitor for Securing Virtual Networks
    Fernandes, Natalia Castro
    Muniz Bandeira Duarte, Otto Carlos
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [44] Securing Virtual Coordinates by Enforcing Physical Laws
    Seibert, Jeff
    Becker, Sheila
    Nita-Rotaru, Cristina
    State, Radu
    2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 315 - 324
  • [45] Securing Virtual Private Networks with SIM Authentication
    Bjornstad, Torstein
    Jorstad, Ivar
    Do Van Thanh
    THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [46] Securing Sensitive Data in Java Virtual Machines
    Towson University, Department of Computer and Information Sciences, MD, United States
    不详
    TX, United States
    不详
    不详
    IEEE/ACIS Int. Conf. Softw. Eng. Res., Manag. Appl., SERA, 2022, (128-131): : 128 - 131
  • [47] Machine to Machine Sensor Network Implementation for Securing Railway Transport
    Suman, Chitra
    Tharani, Lokesh
    Maheshwari, Saurabh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 635 - 643
  • [48] Interplay of Virtual Machine Selection and Virtual Machine Placement
    Mann, Zoltan Adam
    SERVICE-ORIENTED AND CLOUD COMPUTING, (ESOCC 2016), 2016, 9846 : 137 - 151
  • [49] Machine Learning for Securing Traffic in Computer Networks
    BaniMustafa, Ahmed
    Baklizi, Mahmoud
    Khatatneh, Khalaf
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (12) : 426 - 435
  • [50] Dynamic adaptation, composition and orchestration of Web services in virtual environments
    Bertok, Peter
    Reynolds, Stephen
    PERVASIVE COLLABORATIVE NETWORKS, 2008, 283 : 501 - 508