2019
DOI: 10.1109/tnet.2019.2930809
|View full text |Cite
|
Sign up to set email alerts
|

Optimization Model for Backup Resource Allocation in Middleboxes With Importance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…To improve the resource utilization efficiency, the authors of [23] introduces a new sharing mechanism of redundancy and multi-tenancy technology. [24] proposes a backup resource allocation model for middleboxes considering the importance of functions and both failure probabilities of functions and backup servers. [25] studies a reliabilityaware resource allocation algorithm using the shared protection scheme with active-standby redundancy for SFC.…”
Section: Related Workmentioning
confidence: 99%
“…To improve the resource utilization efficiency, the authors of [23] introduces a new sharing mechanism of redundancy and multi-tenancy technology. [24] proposes a backup resource allocation model for middleboxes considering the importance of functions and both failure probabilities of functions and backup servers. [25] studies a reliabilityaware resource allocation algorithm using the shared protection scheme with active-standby redundancy for SFC.…”
Section: Related Workmentioning
confidence: 99%
“…Content may change prior to final publication. [9] Resource exhaustion, hardware failure, and SLA violations No Experimentation [12] Resource revocation risk No Experimentation [13] Data leakage No Graph Theory and heuristic [14] Reduce the risk of co-resident attack No Simulation [15] Reduce the risk of co-resident attack No Simulation [16] Reduce the risk of co-resident attack No Simulation [17] Virtual resources to protect the task execution Yes Semi-Markov Decision Process [18] Virtual resources to protect the task execution No Semi-Markov Decision Process [19] Virtual resources to protect the task execution No Semi-Markov Decision Process [20] Virtual resources to protect the task execution No Markov reward model and simulated annealing [21] Security overhead to protect the task execution Yes Genetic Algorithm [22] Security overhead to protect the task execution Yes Deep Reinforcement Learning [23] Computation and communication uncertainties Yes Game Theory [24] Risk-neutral user, risk-averse user, risk-seeking user Yes Simulation [25] IDS at the edge of the network Yes Stochastic Differential Equation [26] Service failure No Graph Theory [27] Service and server failure No System Optimization and Heuristics Our work…”
Section: Security Risk-aware Edge Server Orchestration a Related mentioning
confidence: 99%
“…Service survivability in the presence of failure is addressed in [26] and [27] from a perspective of a NFV deployment. In [26], Kanizo et al proposed to use a VNF to implement and deploy backup schemes for network functions that ensure high levels of survivability while reducing resource consumption.…”
Section: Security Risk-aware Edge Server Orchestration a Related mentioning
confidence: 99%
See 1 more Smart Citation
“…N ETWORK functions (NFs), such as firewalls and load balancers, are able to be implemented in a flexible way to share the infrastructure resources with the help of network function virtualization (NFV) technology. By decoupling NFs from their dedicated physical network equipments, a given service can be decomposed into a set of virtual network functions (VNFs) which can be deployed on commodity servers [2], [3]. Given a set of services that consist of requested VNFs, a critical problem is how to deploy these VNFs, including placing VNFs and allocating computing resources, with meeting the requirements of services.…”
Section: Introductionmentioning
confidence: 99%