Preserving confidentiality during the migration of virtual SDN topologies: A formal approach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality. In this paper, we present the first approach combining formal models and virtualization to prove confidentiality preservation during the migration process. We describe the network environment, the migration process and the confidentiality with a set of logical predicates that will be used by SNARK to obtain the formal proof of the preservation. We validate our theoretical approach by exhibiting confidentiality violation detection on an illustrative use case.

Original languageEnglish
Title of host publication2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017
EditorsDimiter R. Avresky, Aris Gkoulalas-Divanis, Dimiter R. Avresky, Miguel P. Correia
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781538614655
DOIs
Publication statusPublished - 8 Dec 2017
Externally publishedYes
Event16th IEEE International Symposium on Network Computing and Applications, NCA 2017 - Cambridge, United States
Duration: 30 Oct 20171 Nov 2017

Publication series

Name2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017
Volume2017-January

Conference

Conference16th IEEE International Symposium on Network Computing and Applications, NCA 2017
Country/TerritoryUnited States
CityCambridge
Period30/10/171/11/17

Keywords

  • Formal verification
  • Intrusion detection
  • Network security
  • Software defined networking

Fingerprint

Dive into the research topics of 'Preserving confidentiality during the migration of virtual SDN topologies: A formal approach'. Together they form a unique fingerprint.

Cite this