Security in OpenFlow Enabled Cloud Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
Inception of flow tables as data plane abstraction, and forwarding rules that are managed by centralized controllers in emerging Software Defined Networks (SDN) has stemmed significant progress in OpenFlow based architectures. SDN is particularly fueled by data center networking and cloud computing. OpenFlow coupled with cloud solutions provide dynamic networking capabilities. With the benefits obtained from network services, security enforcement become more important and need powerful techniques for its implementation. Extensive researches in cloud security bring forward numerous methods of leveraging the SDN architecture with efficient security enforcement. The future of SDN and mobile networks is also enlightened if security models are satisfactory to cover dynamic and flexible requirements of evolving networks. This paper presents a survey of the state of the art research on security techniques in OpenFlow based cloud environments. Security is one of the main aspect of any network. A fair study and evaluation of these methods are carried out in the paper along with the security considerations in SDN and its enforcement. The security issues and recommendations for 5g network are covered briefly. This work provides an understanding of the problem, its current solution space, and anticipated future research directions.
Authors and Affiliations
Abdalla Alameen, Sadia Rubab, Bhawna Dhupia, Manjur Kolhar
THE BITWISE OPERATIONS RELATED TO A FAST SORTING ALGORITHM
In the work we discuss the benefit of using bitwise operations in programming. Some interesting examples in this respect have been shown. What is described in detail is an algorithm for sorting an integer array with the...
Sentiment Analysis, Visualization and Classification of Summarized News Articles: A Novel Approach
Due to advancement in technology, enormous amount of data is generated every day. One of the main challenges of large amount of data is user overloaded with huge volume of data. Hence effective methods are highly require...
A Review On Cognitive Mismatch Between Computer and Information Technology And Physicians
Health Information Technology has a great potential to transform the existing health care systems by making them safe, effective and efficient. Multi-functionality and interoperability of health information systems are v...
A Comparative Study Between the Capabilities of MySQl Vs. MongoDB as a Back-End for an Online Platform
In this article we present a comparative study between the usage capabilities of MongoDB, a non-relational database, and MySQL’s usage capabilities, a relational database, as a back-end for an online platform. We will al...
Gesture Recognition based on Human Grasping Activities using PCA-BMU
This research study presents the recognition of fingers grasps for various grasping styles of daily living. In general, the posture of the human hand determines the fingers that are used to create contact between an obje...