Abstract
SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniques – trustworthy network infrastructure monitoring and remote attestation of virtual machines – useful towards a trusted and secure usage of SDN and NFV.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dalton, C., Lioy, A., Lopez, D., Risso, F., Sassu, R.: Exploiting the network for securing personal devices. In: Cleary, F., Felic, M. (eds.) CSP Forum 2014. CCIS, vol. 470, pp. 16–27. Springer, Heidelberg (2014)
Open vSwitch. https://github.com/openvswitch/ovs
TrustedGRUB. http://sourceforge.net/projects/trustedgrub/
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th USENIX Security Symposium, pp. 223–238, San Diego, 9–13 August 2004
ETSI NFV ISG: NFV Security / Problem Statement. Report ETSI GS NFV-SEC 001 (V1.1.1), October 2014. http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf
ETSI NFV ISG: NFV Security / Security and Trust Guidance. Report ETSI GS NFV-SEC 003 (V1.1.1), December 2014. http://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf
ETSI NFV ISG: NFV / Use Cases. Report ETSI GS NFV 001 (V1.1.1), October 2013. http://www.etsi.org/deliver/etsi_gs/NFV/001_099/001/01.01.01_60/gs_NFV001v010101p.pdf
ETSI NFV ISG: NFV Proofs of Concept. http://www.etsi.org/technologies-clusters/technologies/nfv/nfv-poc
Jaeger, T., and Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 19–28, Lake Tahoe, 7–9 June 2006
Berger, S., Sailer, R., Goldman, K.A.: vTPM: virtualizing the trusted platform module. In: 15th USENIX Security Symposium, Vancouver, pp. 305–320, Canada, July 31–August 8, 2006
Goldman, K., Sailer, R., Pendarakis, D., Srinivasan, D.: Scalable integrity monitoring in virtualized environments. In: 5th ACM Workshop on Scalable Trusted Computing, pp. 73–78, Chicago, 4–8 October 2010
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: 19th ACM Symposium on Operating Systems Principles, pp. 164–177, Bolton Landing, 19–22 October 2003
Schiffman, J., Vijayakumar, H., Jaeger, T.: Verifying system integrity by proxy. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 179–200. Springer, Heidelberg (2012)
Acknowledgement
The research described in this paper is part of the SECURED project, co-funded by the European Commission (FP7 grant agreement no. 611458).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Jacquin, L., Lioy, A., Lopez, D.R., Shaw, A.L., Su, T. (2015). The Trust Problem in Modern Network Infrastructures. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-25360-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25359-6
Online ISBN: 978-3-319-25360-2
eBook Packages: Computer ScienceComputer Science (R0)