SDFAC:software defined flow access control mechanism
Academic paper|更新时间:2024-06-05
|
SDFAC:software defined flow access control mechanism
Journal on CommunicationsVol. 36, Issue Z1, Pages: 188-196(2015)
作者机构:
解放军理工大学 指挥信息系统学院,江苏 南京 210007
作者简介:
基金信息:
The National Basic Research Program of China(973 Program)(2012CB315806);The National Natural Science Foundation of China(61379149);The National Natural Science Foundation of China(61402521);The Natural Science Foundation of Jiangsu Province(BK20140070);The Natural Science Foundation of Jiangsu Province(BK20140068);S&T Supporting Project of Jiangsu Province(BY2013095-1-06)
Xiu-lei WANG, Guo-min ZHANG, Chao HU, et al. SDFAC:software defined flow access control mechanism[J]. Journal on Communications, 2015, 36(Z1): 188-196.
DOI:
Xiu-lei WANG, Guo-min ZHANG, Chao HU, et al. SDFAC:software defined flow access control mechanism[J]. Journal on Communications, 2015, 36(Z1): 188-196. DOI: 10.11959/j.issn.1000-436x.2015299.
SDFAC:software defined flow access control mechanism
The software defined networking paradigm decouples control plane from data plane
offering flexible centralized control and fine grain flow management.Based on these advantages
a novel software defined access control mechanism SDFAC was proposed.Firstly
an analysis of the access control model was given from the flow granularity
and the precondition for the fine-grained access control was deduced from the model.Secondly
the framework and basic working process of the SDFAC was described.The flow authentication protocol was designed to support the function of SDFAC.Finally
the experiment results prove the feasibility and availability of SDFAC.
关键词
Keywords
references
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . IEEE Computer , 1996 , 29 ( 2 ): 38 - 47 .
DANGOVAS V , KULIESIUS F . SDN-driven authentication and access control system [J ] . Society of Digital Information & Wireless Communication , 2014 .
AHMAD I , NAMAL S , YLIANTTILA M , et al . Security in software defined networks:a survey [J ] . IEEE Communications Survey & Tutorials , 2015 , 99 : 1 - 30 .
YOON C H , PARK T J , LEE S G , et al . Enabling security functions with SDN:a feasibility study [J ] . Computer Networks , 2015 ,( 85 ): 19 - 35 .
HU Z Y , WANG M G , YAN X Q , et al . A comprehensive security architecture for SDN [A ] . Proceedings of the 18th International Conference on Intelligence in Next Generation Networks [C ] . Paris,France , 2015 . 30 - 37 .
KERPEZ K J , CIOFFI J M , GINIS G , et al . Software-defined access networks [J ] . IEEE Communication Magazine , 2014 , 52 ( 9 ): 152 - 159 .
MATIAS J , GARAY J , MENDIOLA A , et al . Flow NAC:flow-based network access control [A ] . Proceedings of 2014 3rd European Workshop on Software Defined Networks [C ] . Budapest , 2014 . 79 - 84 .
Trusted computing group . trusted network connect architecture for Interoperability,specification version 1.5 [EB/OL ] . http://www.trusteddecomputinggroup.org/tnc/ http://www.trusteddecomputinggroup.org/tnc/ , 2012 .
CHAKRABORTY S , RAY I . TrustBAC-integrating trust relationships into the RBAC model for access control in open system [A ] . Proceedings of the 11th ACM symposium on Access control models and technologies [C ] . New York,USA , 2006 . 49 - 58 .
CASADO M , GARFINKEL T , AKELLA A , et al . SANE:a protection architecture for enterprise networks [A ] . Proceedings of USENIX Security Symposium [C ] . 2006 . 1 - 12 .
CASADO M , FREEDMAN M J , PETTIT J , et al . Ethane:taking control of the enterprise [J ] . ACM SIGCOMM Computer Communication Review , 2007 , 37 ( 4 ): 1 - 12 .
ZHENG R B , YANG W L , ZHOU J . Future access architecture:software-defined access networking [A ] . Proceedings of IEEE the 11th Consumer Communications and Networking Conference [C ] . Las Vegas,NV , 2014 . 881 - 886 .
KLAEDTKE F , KARAME G O , BIFULCO R , et al . Towards an access control scheme for accessing flow in SDN [A ] . Proceedings of the 1st IEEE Conference on Network Softwarization [C ] . London , 2015 . 1 - 6 .
MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al . Openflow:enabling innovation in campus networks [J ] . ACM SIGCOMM Computer Communication Review , 2008 38 : 69 - 74 .
MAZIERES D , KAMINSKY M , KAASHOEK M F , et al . Separating key management from file system security [J ] . ACM SIGOPS Operating System Review , 1999 , 33 ( 5 ): 124 - 139 .