Security in OpenFlow Enabled Cloud Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
Inception of flow tables as data plane abstraction, and forwarding rules that are managed by centralized controllers in emerging Software Defined Networks (SDN) has stemmed significant progress in OpenFlow based architectures. SDN is particularly fueled by data center networking and cloud computing. OpenFlow coupled with cloud solutions provide dynamic networking capabilities. With the benefits obtained from network services, security enforcement become more important and need powerful techniques for its implementation. Extensive researches in cloud security bring forward numerous methods of leveraging the SDN architecture with efficient security enforcement. The future of SDN and mobile networks is also enlightened if security models are satisfactory to cover dynamic and flexible requirements of evolving networks. This paper presents a survey of the state of the art research on security techniques in OpenFlow based cloud environments. Security is one of the main aspect of any network. A fair study and evaluation of these methods are carried out in the paper along with the security considerations in SDN and its enforcement. The security issues and recommendations for 5g network are covered briefly. This work provides an understanding of the problem, its current solution space, and anticipated future research directions.
Authors and Affiliations
Abdalla Alameen, Sadia Rubab, Bhawna Dhupia, Manjur Kolhar
A Survey of Quality Prediction of Product Reviews
With the help of Web-2.0, the Internet offers a vast amount of reviews on many topics and in different domains. This has led to an explosive growth of product reviews and customer feedback, which presents the problem of...
Gait Identification using Neural Network
Biometric System has become more important in security and verification of any human, which is under surveillance. Identification from distance is also possible by this technology. Researchers are taking interest to find...
Big Data Knowledge Mining
Big Data (BD) era has been arrived. The ascent of big data applications where information accumulation has grown beyond the ability of the present programming instrument to catch, manage and process within tolerable shor...
Analysis of Efficient Cognitive Radio MAC Protocol for Ad Hoc Networks
Cognitive Radio (CR) is an emerging technology to exploit the existing spectrum dynamically. It can intelligently access the vacant spectrum frequency bands. Although a number of methodologies have been suggested for imp...
E-shape Multiband Patch Antenna for 4G, C-band and S-band Applications
In this study, a new E shape mounted on minowaki island patch antenna on FR4 substrate is presented for communication systems applications. With insertion of shortening pin between patch and ground plane, the proposed st...