Loading [MathJax]/extensions/MathMenu.js
Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors | IEEE Conference Publication | IEEE Xplore

Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors


Abstract:

Frequent cyber-attacks force the service provider to employ security-aware service functions (SFs) to accommodate client network requests. Thanks to virtualization techni...Show More

Abstract:

Frequent cyber-attacks force the service provider to employ security-aware service functions (SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity, a security-aware SF can be provided by diverse vendors with various configurations, each of which needs various implementation cost and provides different security levels. When a client's network request comes, the multi-configuration SFs could compose various security-aware service function chains (S-SFCs) to flexibly satisfy the security requirement. In this paper, we investigate how to efficiently compose and embed an S-SFC to satisfy the client's security requirement. With the objective of cost optimization, we formulate the problem of security-aware service function chain deployment and prove its NP-hardness. We propose the technique of the security-cost-balance (SCB) factor to efficiently consider the capability of a physical node and the cost when the node is employed to satisfy the client's security requirement. Based on this technique, we develop an efficient algorithm called SCB-based S-SFC deployment (SCB-SD). The simulation results show that SCB-SD significantly outperforms the benchmarks directly extended from the state-of-the-art.
Date of Conference: 04-08 December 2023
Date Added to IEEE Xplore: 26 February 2024
ISBN Information:

ISSN Information:

Conference Location: Kuala Lumpur, Malaysia
References is not available for this document.

I. Introduction

Network function virtualization (NFV) is proposed to reduce capital expenditures (CAPEX) and operational expenses (OPEX) when accommodating clients' network services [1]. With NFV, the network functions required by the client are implemented with software-based modules called service functions (SFs). An NFV-enabled service request (NSR) generally includes a set of SFs and the corresponding resource demands (e.g., computation, bandwidth) [2]. To accommodate an NSR, the service provider must concatenate the required SFs into a service function chain (SFC) and deploy it over a shared physical network (PN). The above process is referred to as the service function chaining and embedding (SFCE) [3]. After the SFCE process, the carrier of an SF is referred to as the SF instance (SFI), and the physical forwarding path that hosts the SFC is called the service function path (SFP) [4].

Select All
1.
D. Zheng, G. Shen, X. Cao and B. Mukherjee, "Towards optimal parallelism-aware service chaining and embedding", IEEE Trans. Netw. Serv. Manag., vol. 19, no. 3, pp. 2063-2077, 2022.
2.
X. Shang, Z. Liu and Y. Yang, "Online service function chain placement for cost-effectiveness and network congestion control", IEEE Trans. Computers, vol. 71, no. 1, pp. 27-39, 2022.
3.
P. K. Thiruvasagam, V. J. Kotagi and C. S. R. Murthy, "A reliability-aware delay guaranteed and resource efficient placement of service function chains in softwarized 5G networks", IEEE Trans. Cloud Comput., vol. 10, no. 3, pp. 1515-1531, 2022.
4.
D. Zheng, C. Peng, X. Liao, L. Tian, G. Luo and X. Cao, "Towards latency optimization in hybrid service function chain composition and embedding", Proc. IEEE INFOCOM, pp. 1539-1548, 2020.
5.
W. Duo, M. Zhou and A. Abusorrah, "A survey of cyber attacks on cyber physical systems: Recent advances and challenges", IEEE CAA J. Autom. Sinica, vol. 9, no. 5, pp. 784-800, 2022.
6.
M. Pattaranantakul, C. Vorakulpipat and T. Takahashi, "Service function chaining security survey: Addressing security challenges and threats", Comput. Networks, vol. 221, pp. 109484, 2023.
7.
J. Gao, L. Feng, P. Yu, F. Zhou, Z. Wu, X. Qiu, et al., "Resource consumption and security-aware multi-tenant service function chain deployment based on hypergraph matching", Comput. Networks, vol. 216, pp. 109298, 2022.
8.
D. Zhao, L. Luo, H. Yu, V. Chang, R. Buyya and G. Sun, "Security-sla-guaranteed service function chain deployment in cloud-fog computing networks", Clust. Comput., vol. 24, no. 3, pp. 2479-2494, 2021.
9.
L. Bradatsch, M. Häberle, B. Steinert, F. Kargl and M. Menth, "Secure service function chaining in the context of zero trust security", Proc. IEEE LCN, pp. 123-131, 2022.
10.
B. Wang, X. Cao, C. Peng, J. Li and D. Zheng, "Towards service function chaining and embedding for multi-security guarantee levels", Proc. IEEE ICCC, pp. 441-445, 2022.
11.
D. Zheng, H. Gu, W. Wei, C. Peng and X. Cao, "Network service chaining and embedding with provable bounds", IEEE Internet Things J., vol. 8, no. 9, pp. 7140-7151, 2021.
12.
K. R. Varadarajan and L. J. Schulman, "Weighted geometric set cover via quasi-uniform sampling", Proc. ACM STOC, pp. 641-648, 2010.
13.
F. Yaghoubpour, B. Bakhshi and F. Seifi, "End-to-end delay guaranteed service function chain deployment: A multi-level mapping approach", Comput. Commun., vol. 194, pp. 433-445, 2022.
14.
D. Zheng, C. Peng, X. Liao and X. Cao, "Toward optimal hybrid service function chain embedding in multiaccess edge computing", IEEE Internet Things J., vol. 7, no. 7, pp. 6035-6045, 2020.
15.
S. Zhang, W. Jia, Z. Tang, J. Lou and W. Zhao, "Efficient instance reuse approach for service function chain placement in mobile edge computing", Comput. Networks, vol. 211, pp. 109010, 2022.
16.
H. Chen, S. Wang, G. Li, L. Nie, X. Wang and Z. Ning, "Distributed orchestration of service function chains for edge intelligence in the industrial internet of things", IEEE Trans. Ind. Informatics, vol. 18, no. 9, pp. 6244-6254, 2022.
Contact IEEE to Subscribe

References

References is not available for this document.