A heuristic-based algorithm for privacy-oriented virtual network embedding

Network virtualization has become increasingly popular in recent years. It has the potential to allow timely handling of network infrastructure requests and, after instantiated, their lifecycle. In addition, it enables improved physical resource utilization. However, the use of network virtualization in large-scale, real environments depends on the ability to adequately map virtual routers and links to physical resources, as well as to protect virtual networks against security threats. With respect to security, confidentiality and privacy mechanisms have become essential in light of recent discoveries related to pervasive electronic surveillance. In this paper we propose a heuristic method for virtual network embedding with security support. The method features precise modeling of overhead costs of security mechanisms and handles incoming requests in an online manner. Additionally, we present a detailed performance comparison between the proposed heuristic and an optimization model based on the same problem. The obtained results demonstrate that the heuristic method is able to find feasible mappings in the order of seconds even when dealing with large network infrastructures, while the optimization model is limited to smaller networks.

[1]  Minlan Yu,et al.  Rethinking virtual network embedding: substrate support for path splitting and migration , 2008, CCRV.

[2]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[3]  Albert,et al.  Topology of evolving networks: local events and universality , 2000, Physical review letters.

[4]  David G. Andersen,et al.  Theoretical Approaches to Node Assignment , 2002 .

[5]  Brendan Jennings,et al.  Policy-assisted planning and deployment of virtual networks , 2011, 2011 7th International Conference on Network and Service Management.

[6]  Sheldon Howard Jacobson,et al.  The Theory and Practice of Simulated Annealing , 2003, Handbook of Metaheuristics.

[7]  Luciana S. Buriol,et al.  Security-aware optimal resource allocation for virtual network embedding , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[8]  Raouf Boutaba,et al.  ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping , 2012, IEEE/ACM Transactions on Networking.

[9]  Lazaros F. Merakos,et al.  A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.

[10]  Xiang Cheng,et al.  Virtual network embedding through topology-aware node ranking , 2011, CCRV.

[11]  Gustavo Prado Alkmim,et al.  Mapping virtual networks onto substrate networks , 2013, Journal of Internet Services and Applications.