Corpus ID: 9766556

SICS: Secure In-Cloud Service Function Chaining

@article{Wang2016SICSSI,
  title={SICS: Secure In-Cloud Service Function Chaining},
  author={Huazhe Wang and Xin Li and Yu Zhao and Ye Yu and Hongkun Yang and Chen Qian},
  journal={ArXiv},
  year={2016},
  volume={abs/1606.07079}
}
  • Huazhe Wang, Xin Li, +3 authors Chen Qian
  • Published in ArXiv 2016
  • Computer Science
  • There is an increasing trend that enterprises outsource their network functions to the cloud for lower cost and ease of management. However, network function outsourcing brings threats to the privacy of enterprises since the cloud is able to access the traffic and rules of in-cloud network functions. Current tools for secure network function outsourcing either incur large performance overhead or do not support real-time updates. In this paper, we present SICS, a secure service function chain… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    3
    Twitter Mentions

    Citations

    Publications citing this paper.
    SHOWING 1-5 OF 5 CITATIONS

    SDNSOC: Object Oriented SDN Framework

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    SUPC: SDN enabled Universal Policy Checking in Cloud Network

    VIEW 7 EXCERPTS
    CITES RESULTS, METHODS & BACKGROUND
    HIGHLY INFLUENCED

    A Network Service Permission Control Platform for Service Function Chaining

    • Anh-Vu Vu, Younghan Kim
    • Computer Science
    • 2017 International Conference on Information Networking (ICOIN)
    • 2017
    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 25 REFERENCES

    Making middleboxes someone else's problem: network processing as a cloud service

    VIEW 8 EXCERPTS
    HIGHLY INFLUENTIAL

    Outsourcing network functionality

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    The click modular router

    VIEW 8 EXCERPTS
    HIGHLY INFLUENTIAL

    SplitBox: Toward Efficient Private Network Function Virtualization

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    BlindBox: Deep Packet Inspection over Encrypted Traffic

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    Generalized pattern matching string search on encrypted data in cloud systems

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    Network functions virtualisation: an introduction, benefits, enablers, challenges and call for action, introductory white paper

    • R. Guerzoni
    • In SDN and OpenFlow World Congress,
    • 2012
    VIEW 2 EXCERPTS
    HIGHLY INFLUENTIAL