Security in OpenFlow Enabled Cloud Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
Inception of flow tables as data plane abstraction, and forwarding rules that are managed by centralized controllers in emerging Software Defined Networks (SDN) has stemmed significant progress in OpenFlow based architectures. SDN is particularly fueled by data center networking and cloud computing. OpenFlow coupled with cloud solutions provide dynamic networking capabilities. With the benefits obtained from network services, security enforcement become more important and need powerful techniques for its implementation. Extensive researches in cloud security bring forward numerous methods of leveraging the SDN architecture with efficient security enforcement. The future of SDN and mobile networks is also enlightened if security models are satisfactory to cover dynamic and flexible requirements of evolving networks. This paper presents a survey of the state of the art research on security techniques in OpenFlow based cloud environments. Security is one of the main aspect of any network. A fair study and evaluation of these methods are carried out in the paper along with the security considerations in SDN and its enforcement. The security issues and recommendations for 5g network are covered briefly. This work provides an understanding of the problem, its current solution space, and anticipated future research directions.
Authors and Affiliations
Abdalla Alameen, Sadia Rubab, Bhawna Dhupia, Manjur Kolhar
A Novel Design for XOR Gate used for Quantum-Dot Cellular Automata (QCA) to Create a Revolution in Nanotechnology Structure
Novel digital technologies always lead to high density and very low power consumption. One of these concepts is Quantum-dot Cellular Automata (QCA), which is one of the new emerging nanotechnology-based on Coulomb repuls...
Comparative Study of Methods that Detect Levels of Lead and its Consequent Toxicity in the Blood
The present work is the study of the different methods used to determine the toxicity produced by the presence of a contaminating metal in the blood. Mainly, the presence of lead in the blood was taken as a reference to...
Design and Learning Effectiveness Evaluation of Gamification in e-Learning Systems
This paper proposes a gamification design model that can be used to design and develop gamified e-learning systems. Furthermore, a controlled and carefully designed experimental evaluation in terms of learning effectiven...
Domain and Schema Independent Semantic Model Verbalization: A Conceptual Overview
Semantic Web-based technologies have become extremely popular and its a success that has spread across many domains, additional to the computer science domain. Nevertheless, the reusability aspects associated with the cr...
Automatic Detection of Omega Signals Captured by the Poynting Flux Analyzer (PFX) on Board the Akebono Satellite
The Akebono satellite was launched in 1989 to observe the Earth’s magnetosphere and plasmasphere. Omega was a navigation system with 8 ground stations transmitter and had transmission pattern that repeats every 10 s. Fro...