Abstract
Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.




Similar content being viewed by others
References
Belbekkouche, A., Hasan, M.M.: Resource discovery and allocation in network virtualization. IEEE Commun. Surv. Tutor. 14(4), 1114–1128 (2012)
Wei, X., Shoufeng, H., Li, H., Yang, F., Jin, Y.: A survey on virtual network embedding in cloud computing centers. Open Autom. Control Syst. J. 6, 414–425 (2014)
Melekhova, A., Vinnikov, V.: Cloud and grid part II: virtualized resource balancing. Indian J. Sci. Technol. 8(29), 1–8 (2015)
Haider, A., Potter, R., Nakao, A.: Challenges in resource allocation in network virtualization. In: 20th ITC Seminar, Vietnam, vol. 20, pp. 22–30 (2009)
Fischer, A., Botero, J.F., Beck, M.T., Hesselbach, X., de Meer, H.: Virtual network embedding: a survey. IEEE Commun. Surv. Tutor. 15(4), 1888–1906 (2013)
Khajehei, K., Cloud, G.: Virtual machines migration challenges. Indian J. Sci. Technol. 9(5), 1–8 (2016)
Chowdhury, M., Rahman, M.R., Boutaba, R.: Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. Netw. 20(1), 206–219 (2012)
Houidi, I., Louati, W., Zeghlache, D.: A distributed virtual network mapping algorithm. In: Proceedings of IEEE ICC 2008, Beijing, China, pp. 5634–5640 (2008)
Botero, J.F., Hesselbach, X., Duelli, M., Schlosser, D., Fischer, A., de Meer, H.: Energy efficient virtual network embedding. IEEE Commun. Lett. 16(5), 756–759 (2012)
Andreas, F., Botero, J.F., Duelli, M., Schlosser, D., Hesselbach, X., De Meer, H.: ALEVIN—A framework to develop, compare, and analyze virtual network embedding algorithms. Electron. Commun. EASST 37, 1–12 (2011)
Goyette, R., Karmouch, A.: A virtual network topology security assessment process. In: 7th IWCMC, pp. 974–979 (2011)
4WARD. http://www.4ward-project.eu/
Shah, S., Mehtre, B.M.: An overview of vulnerability assessment and penetration testing techniques. J. Comput. Virol. Hack. Tech. 11(1), 27–49 (2015)
Chowdhury, N., Boutaba, R.: A survey of network virtualization. Comput. Netw. (Elsevier) 54(5), 862–876 (2010)
Li, G., Park, S.T., Ko, M.H.: A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. J. Comput. Virol. Hack. Tech. 12(3), 151–161 (2016)
Ranjith, P., Priya, C., Shalini, K.: On covert channels between virtual machines. J. Comput. Virol. 8(3), 85–97 (2012)
Salaun, M.: Practical overview of a Xen covert channel. J. Comput. Virol. 6(4), 317–328 (2010)
Sharma, A.K., Nitin, N.: A literature survey on energy efficient virtual network embedding in cloud computing. Int. J. Appl. Eng. Res. 11(6), 3828–3841 (2016)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, H.S., Lee, SH. An evaluation method for secure virtual network embedding algorithms. J Comput Virol Hack Tech 13, 265–270 (2017). https://doi.org/10.1007/s11416-017-0303-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-017-0303-9