ABSTRACT
In recent years, with the increase in the variety of communication devices, as well as the rapid development of the Internet of Things, edge computing, and machine learning, the existing security solutions can neither solve the problem of increasing fragmentation of security needs and security scenarios, nor the problem of the mismatch between security protection means and business scenarios, so the new software-defined security middle platform architecture is proposed. The infrastructure plane is connected to the architecture through network function virtualization. The security middle platform has the advantages of both the data middle platform and the business middle platform is designed to solve the fragmentation problem. Hybrid cloud environment is designed according to the cost, expansion, and security requirements. The Control plane solves the matching problem for the middle platform resource pool through flexible and intelligent scheduling. The small forward platform design of the application plane further reduces the development cost.
- Metso's new generation data security architecture is officially released,Google Scholar
- https://m.sohu.com/a/427585035_99921170?_trans_=010004_pcwzy [Online; accessed 2022].Google Scholar
- Middle Office Empowers Security Construction,Google Scholar
- http://blog.nsfocus.net/insturc-30/ [Online; accessed 2022].Google Scholar
- Wang Y, Sun Q, Bie R. Blockchain-Based Secure Sharing Mechanism of Online Education Data[J]. Procedia Computer Science, 2022, 202: 283-288.Google ScholarDigital Library
- Kim H, Kim J, Kim Y, Design of network threat detection and classification based on machine learning on cloud computing[J]. Cluster Computing, 2019, 22(1): 2341-2350.Google ScholarDigital Library
- Enterprise-level capability reuse platform,Google Scholar
- http://cloud.idreamsky.com/[Online; accessed 2022].Google Scholar
- Xinyu C, Jiaying L, Tong D, Middle-platform strategy: mid-dle-platform construction and digital commerce[J]. 2019.Google Scholar
- Zhang C, Hou L . Data middle platform construction: The strategy and practice of National Bureau of Statistics of China[J]. Statistical Journal of the IAOS, 2020, 36(4):979-986.Google ScholarCross Ref
- Wu H, Shen L, Chen X, Research on the Application of Data Middle Platform Technology in Integrated Energy Business System[C]// 2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI). IEEE, 2020.Google Scholar
- Jain R, Paul S. Network virtualization and software defined net-working for cloud computing: a survey[J]. IEEE Communications Magazine, 2013, 51(11): 24-31.Google ScholarCross Ref
- Nunes B A A, Mendonca M, Nguyen X N, A survey of software-defined networking: Past, present, and future of programmable networks[J]. IEEE Communications surveys & tutorials, 2014, 16(3): 1617-1634.Google Scholar
- Hu F, Hao Q, Bao K. A survey on software-defined network and openflow: From concept to implementation[J]. IEEE Communications Surveys & Tutorials, 2014, 16(4): 2181-2206.Google ScholarCross Ref
- Canini M, Venzano D, Perešíni P, A NICE Way to Test OpenFlow Applications[C]//9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 2012: 127-140.Google Scholar
- Dixon C, Olshefski D, Jain V, Software defined networking to support the software defined environment[J]. IBM Journal of Re-search and Development, 2014, 58(2/3): 3: 1-3: 14.Google ScholarDigital Library
- Jararweh Y, Al-Ayyoub M, Benkhelifa E, Software defined cloud: Survey, system and evaluation[J]. Future Generation Com-puter Systems, 2016, 58: 56-74.Google ScholarDigital Library
- Al-Ayyoub M, Jararweh Y, Benkhelifa E, Sdsecurity: A software defined security experimental framework[C]//2015 IEEE international conference on communication workshop (ICCW). IEEE, 2015: 1871-1876.Google Scholar
- Security challenges in sdn (software-defined networks),Google Scholar
- https://www.sdxcentral.com/resources/security/security-challenges-sdn-software-defined-networks/ [Online; accessed 2022].Google Scholar
- Herrera J G, Botero J F. Resource allocation in NFV: A comprehensive survey[J]. IEEE Transactions on Network and Service Management, 2016, 13(3): 518-532.Google ScholarDigital Library
- Bonfim M S, Dias K L, Fernandes S F L. Integrated NFV/SDN architectures: A systematic literature review[J]. ACM Computing Surveys (CSUR), 2019, 51(6): 1-39.Google Scholar
- Zhang K, He B, Hu J, {G-NET}: Effective {GPU} Sharing in {NFV} Systems[C]//15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 2018: 187-200.Google Scholar
- Silva F A, Fé I, Gonçalves G. Stochastic models for performance and cost analysis of a hybrid cloud and fog architecture[J]. The Journal of Supercomputing, 2021, 77(2): 1537-1561.Google ScholarCross Ref
- Valentine R. Success and sustainability at Supercell,Google Scholar
- https://www.gamesindustry.biz/articles/2019-01-15-success-and-sustainability-at-supercell [Online; accessed 2022].Google Scholar
- Jararweh Y, Al-Ayyoub M, Darabseh A, SDIoT: a software defined based internet of things framework[J]. Journal of Ambient Intelligence and Humanized Computing, 2015, 6(4): 453-461.Google ScholarCross Ref
- Software defined perimeter, white paper, Cloud Security Alliance, 2013.Google Scholar
- Gang P . CDN: Content Distribution Network[J]. Research Proficiency Exam Report, 2004:1-6.Google Scholar
Index Terms
- A software-defined security middle platform architecture
Recommendations
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security5G is envisioned as a transformation of the communications architecture towards multi-tenant, scalable and flexible infrastructure, which heavily relies on virtualised network functions and programmable networks. In particular, orchestration will ...
A systematic literature review of security software defined network: research trends, threat, attack, detect, mitigate, and countermeasure
ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication EngineeringThe development of internet technology in the current decade is growing very rapidly. This triggers a variety of innovations in the application layer. However, these developments cannot be followed by network layers that tend to be slow. The concept of ...
Security of Software Defined Networks
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper ...
Comments