Security and Privacy Issues of Implementing Cloud Computing on NDN

The significant deficiencies of current internet architecture in providing users’ present and future Quality of Service requirements have driven scientists to suggest a different network architecture for the internet. This new architecture is called Named Data Networking (NDN) and works on the basis of distributing named content. Recent studies indicate that the future internet will be in fact content centric. Consequently, many researchers are trying to improve this newly proposed architecture, and offer solutions for the implementation of different essential applications on this content centric network. One of the most important applications currently being utilized by many businesses is Cloud Computing. Cloud Service Providers offer organizations considerable IT services eliminating the need for them to take care of their IT infrastructure. However, current implementations of cloud computing seem to have security and privacy issues making people hesitant about moving to the cloud. These issues stem from vulnerabilities of the cloud architecture itself and the network on which it is implemented. Many studies have been conducted to investigate these issues on the current internet architecture. In this paper, however, we tried to investigate the network-layer related threats of a cloud implemented on NDN. We mentioned previously known security and privacy issues of cloud services and analyzed their effect on this new cloud system to help readers gain an insight into the changing nature of threats and security concerns on this new network architecture. Our study revealed that the influence of some of these issues alleviates on NDN.

[1]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[2]  Massimo Gallo,et al.  Modeling data transfer in content-centric networking , 2011, 2011 23rd International Teletraffic Congress (ITC).

[3]  Jennifer Rexford,et al.  Autonomous security for autonomous systems , 2008, Comput. Networks.

[4]  Tobias Lauinger,et al.  Security & Scalability of Content-Centric Networking , 2010 .

[5]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[6]  Pablo Rodriguez,et al.  Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures , 2012 .

[7]  Lixia Zhang,et al.  Understanding the Challenges in Securing Internet Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.

[8]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[9]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach (6th Edition) , 2007 .

[10]  Traian Andrei Cloud Computing Challenges and Related Security Issues , 2009 .

[11]  Pablo Rodriguez,et al.  Privacy risks in named data networking: what is the cost of performance? , 2012, CCRV.

[12]  Rui Chen,et al.  Live Streaming with Content Centric Networking , 2012, 2012 Third International Conference on Networking and Distributed Computing.

[13]  Van Jacobson,et al.  A new approach to securing audio conference tools , 2011, AINTEC '11.

[14]  R. Lua,et al.  Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.

[15]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[16]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[17]  Aleksandar Kuzmanovic,et al.  Pollution attacks and defenses for Internet caching systems , 2008, Comput. Networks.

[18]  Lixia Zhang,et al.  Data naming in Vehicle-to-Vehicle communications , 2012, 2012 Proceedings IEEE INFOCOM Workshops.