2015
DOI: 10.1109/mcom.2015.7081092
|View full text |Cite
|
Sign up to set email alerts
|

Virtualized security at the network edge: a user-centric approach

Abstract: The current device-centric protection model against security threats has serious limitations. On the one hand, the proliferation of user terminals such as smart-phones, tablets, notebooks, smart TVs, game consoles and desktop computers makes it extremely difficult to achieve the same level of protection regardless of the device used. On the other hand, when various users share devices (e.g., parents and kids using the same devices at home), the set up of distinct security profiles, policies, and protection rul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 7 publications
0
17
0
Order By: Relevance
“…The system architecture, including also the external infrastructure architecture [3], is easily mapped to an NFV deployment and a design compatible with the ETSI standard [4] is currently under development. The concept of the Service Graph allows for complex modeling of VNFs chaining, becoming an NFV enabler.…”
Section: Discussionmentioning
confidence: 99%
“…The system architecture, including also the external infrastructure architecture [3], is easily mapped to an NFV deployment and a design compatible with the ETSI standard [4] is currently under development. The concept of the Service Graph allows for complex modeling of VNFs chaining, becoming an NFV enabler.…”
Section: Discussionmentioning
confidence: 99%
“…In the literature, the SECaaS approach has been deeply investigated in the last few years. For instance, some authors [9] proposed a "user-centric" approach for the provision of virtualised security at the network edge. In that paper, a complete framework design is shown, in which an NFV Infrastructure is used to provide security services for the end-user terminals.…”
Section: Security-as-a-service In An Nfv Environmentmentioning
confidence: 99%
“…Given the reduced set of security features integrated in virtualization platforms and the increasing needs for crosscloud deployments, users are generally left most of the burden for protecting their applications against external threats. Since, on first approximation, virtualization environments could be viewed as special instances of physical networks, softwarebased versions of security middleboxes may be integrated in service graph design [3], [4]. We argue that this approach comes with important limitations in the current cyber-security landscape:…”
Section: Beyond the Security Perimeter Modelmentioning
confidence: 99%