2021
DOI: 10.1109/jproc.2021.3127277
|View full text |Cite
|
Sign up to set email alerts
|

Building In-the-Cloud Network Functions: Security and Privacy Challenges

Abstract: The article surveys the state-of-the-art literature on network function outsourcing, with a special focus on privacy and security issues.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 165 publications
(234 reference statements)
0
3
0
Order By: Relevance
“…According to a case study released by the Cloud Security Alliance (CSA), the top three threats in cloud computing are data breach, insufficient identity, credential and access management, and insecure interfaces and Application Program Interfaces (APIs) [54]. Cloud virtualization security [55,56], cloud data security [57][58][59], and cloud application security [60,61] are also widely discussed. Other recognized issues related to security and privacy in cloud computing include multi-tenancy, confidentiality, and phishing [62].…”
Section: Security Collaborationmentioning
confidence: 99%
“…According to a case study released by the Cloud Security Alliance (CSA), the top three threats in cloud computing are data breach, insufficient identity, credential and access management, and insecure interfaces and Application Program Interfaces (APIs) [54]. Cloud virtualization security [55,56], cloud data security [57][58][59], and cloud application security [60,61] are also widely discussed. Other recognized issues related to security and privacy in cloud computing include multi-tenancy, confidentiality, and phishing [62].…”
Section: Security Collaborationmentioning
confidence: 99%
“…However, skyline query services, if deployed in the cloud, may raise critical privacy concerns regarding the outsourced databases and skyline queries, which may contain proprietary/privacy-sensitive information. Moreover, the cloud might even suffer from data breaches [4], [5] which would seriously harm data privacy. These critical concerns necessitate Yifeng Zheng, Weibo Wang, Songlei Wang, and Zhongyun Hua are with the School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Guangdong 518055, China (e-mail: yifeng.zheng@hit.edu.cn, weibo.wang.hitsz@outlook.com, songlei.wang@outlook.com, huazhongyun@hit.edu.cn).…”
Section: Introductionmentioning
confidence: 99%
“…GNNs can empower a variety of graph-centric applications such as node classification [6], edge classification [7] and link prediction [8]. With the widespread adoption of cloud computing, it is increasingly popular to deploy machine learning training and inference services in the cloud [9], [10], due to the well-understood benefits [11], [12]. However, GNN training and inference, if deployed in the public cloud, will raise critical severe privacy concerns.…”
Section: Introductionmentioning
confidence: 99%