Skip to main content
Log in

An evaluation method for secure virtual network embedding algorithms

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Due to the ossification of the current Internet, it is difficult to launch new service. One of solutions is network virtualization. Numerous virtual network embedding (VNE) algorithms have been proposed in many literatures. But, there is no general methods or frameworks for evaluation of these algorithms. We have analyzed a number of studies, and found appropriate evaluation indexes that can be used in evaluating the functionalities of VNE algorithms. Based on those indexes, we presented a new evaluation method of secure VNE algorithms. To make a virtual network with the various requirements, the infrastructure provider needs effective resource allocation algorithm. The role of VNE is to allocate physical resources to virtual nodes or links to form virtual networks. In order to use the resources of physical networks, appropriate resource allocation algorithms are required. We found a set of evaluation indexes by analyzing the previous proposed researches. Through analysis, we found that our proposed method can be grouped into two functional attributes for classification. One attribute is the basic attributes that mean special features of architecture and the other is the evaluation attributes that perform the assessment of algorithms. We have evaluated the algorithms with our proposed evaluation methods and found to be useful to choose the appropriate algorithm to the infrastructure provider. The proposed method was found to be more convenient to perform the evaluation of the algorithms in real-world simulation. This method helps infrastructure providers to choose the appropriate VNE algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Belbekkouche, A., Hasan, M.M.: Resource discovery and allocation in network virtualization. IEEE Commun. Surv. Tutor. 14(4), 1114–1128 (2012)

    Article  Google Scholar 

  2. Wei, X., Shoufeng, H., Li, H., Yang, F., Jin, Y.: A survey on virtual network embedding in cloud computing centers. Open Autom. Control Syst. J. 6, 414–425 (2014)

    Article  Google Scholar 

  3. Melekhova, A., Vinnikov, V.: Cloud and grid part II: virtualized resource balancing. Indian J. Sci. Technol. 8(29), 1–8 (2015)

    Google Scholar 

  4. Haider, A., Potter, R., Nakao, A.: Challenges in resource allocation in network virtualization. In: 20th ITC Seminar, Vietnam, vol. 20, pp. 22–30 (2009)

  5. Fischer, A., Botero, J.F., Beck, M.T., Hesselbach, X., de Meer, H.: Virtual network embedding: a survey. IEEE Commun. Surv. Tutor. 15(4), 1888–1906 (2013)

    Article  Google Scholar 

  6. Khajehei, K., Cloud, G.: Virtual machines migration challenges. Indian J. Sci. Technol. 9(5), 1–8 (2016)

    Article  Google Scholar 

  7. Chowdhury, M., Rahman, M.R., Boutaba, R.: Vineyard: virtual network embedding algorithms with coordinated node and link mapping. IEEE/ACM Trans. Netw. 20(1), 206–219 (2012)

    Article  Google Scholar 

  8. Houidi, I., Louati, W., Zeghlache, D.: A distributed virtual network mapping algorithm. In: Proceedings of IEEE ICC 2008, Beijing, China, pp. 5634–5640 (2008)

  9. Botero, J.F., Hesselbach, X., Duelli, M., Schlosser, D., Fischer, A., de Meer, H.: Energy efficient virtual network embedding. IEEE Commun. Lett. 16(5), 756–759 (2012)

    Article  Google Scholar 

  10. Andreas, F., Botero, J.F., Duelli, M., Schlosser, D., Hesselbach, X., De Meer, H.: ALEVIN—A framework to develop, compare, and analyze virtual network embedding algorithms. Electron. Commun. EASST 37, 1–12 (2011)

    Google Scholar 

  11. Goyette, R., Karmouch, A.: A virtual network topology security assessment process. In: 7th IWCMC, pp. 974–979 (2011)

  12. 4WARD. http://www.4ward-project.eu/

  13. Shah, S., Mehtre, B.M.: An overview of vulnerability assessment and penetration testing techniques. J. Comput. Virol. Hack. Tech. 11(1), 27–49 (2015)

    Article  Google Scholar 

  14. Chowdhury, N., Boutaba, R.: A survey of network virtualization. Comput. Netw. (Elsevier) 54(5), 862–876 (2010)

    Article  MATH  Google Scholar 

  15. Li, G., Park, S.T., Ko, M.H.: A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis. J. Comput. Virol. Hack. Tech. 12(3), 151–161 (2016)

    Article  Google Scholar 

  16. Ranjith, P., Priya, C., Shalini, K.: On covert channels between virtual machines. J. Comput. Virol. 8(3), 85–97 (2012)

    Article  Google Scholar 

  17. Salaun, M.: Practical overview of a Xen covert channel. J. Comput. Virol. 6(4), 317–328 (2010)

    Article  Google Scholar 

  18. Sharma, A.K., Nitin, N.: A literature survey on energy efficient virtual network embedding in cloud computing. Int. J. Appl. Eng. Res. 11(6), 3828–3841 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Ho Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, H.S., Lee, SH. An evaluation method for secure virtual network embedding algorithms. J Comput Virol Hack Tech 13, 265–270 (2017). https://doi.org/10.1007/s11416-017-0303-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0303-9

Keywords

Navigation