Logo Repositorio Institucional

Please use this identifier to cite or link to this item: http://dspace.ucuenca.edu.ec/handle/123456789/37152
Title: Virtualized security at the network edge: a user-centric approach
Authors: Ciaccia, Francesco
Risso, Fulvio
Bosco, Francesca
Charalambides, Savvas
Kuusijarvi, Jarkko
Shaw, Adrian
Jacquin, Ludovic
Sassu, Roberto
Pastor, Antonio
Yannuzzi,, Marcelo
Serral Gracià, René
Montero Banegas, Diego Teodoro
Lioy, Antonio
Basile, Cataldo
Nemirovsky, Mario
Georgiades, Michael
metadata.dc.ucuenca.correspondencia: Montero Banegas, Diego Teodoro, dmontero@ac.upc.edu
Keywords: Security
Ontologies
Network security
Uniform resource locators
Analytical models
Virtualization
metadata.dc.ucuenca.areaconocimientofrascatiamplio: 2. Ingeniería y Tecnología
metadata.dc.ucuenca.areaconocimientofrascatidetallado: 2.2.4 Ingeniería de La Comunicación y de Sistemas
metadata.dc.ucuenca.areaconocimientofrascatiespecifico: 2.2 Ingenierias Eléctrica, Electrónica e Información
metadata.dc.ucuenca.areaconocimientounescoamplio: 06 - Información y Comunicación (TIC)
metadata.dc.ucuenca.areaconocimientounescodetallado: 0612 - Base de Datos, Diseno y Administración de Redes
metadata.dc.ucuenca.areaconocimientounescoespecifico: 061 - Información y Comunicación (TIC)
Issue Date: 2015
metadata.dc.ucuenca.volumen: Volumen 53, número 4
metadata.dc.source: IEEE Communications Magazine
metadata.dc.identifier.doi: 10.1109/MCOM.2015.7081092
metadata.dc.type: ARTÍCULO
Abstract: 
The current device-centric protection model against security threats has serious limitations. On one hand, the proliferation of user terminals such as smartphones, tablets, notebooks, smart TVs, game consoles, and desktop computers makes it extremely difficult to achieve the same level of protection regardless of the device used. On the other hand, when various users share devices (e.g., parents and kids using the same devices at home), the setup of distinct security profiles, policies, and protection rules for the different users of a terminal is far from trivial. In light of this, this article advocates for a paradigm shift in user protection. In our model, protection is decoupled from users' terminals, and it is provided by the access network through a trusted virtual domain. Each trusted virtual domain provides unified and homogeneous security for a single user irrespective of the terminal employed. We describe a user-centric model where nontechnically savvy users can define their own profiles and protection rules in an intuitive way. We show that our model can harness the virtualization power offered by next-generation access networks, especially from network functions virtualization in the points of presence at the edge of telecom operators. We also analyze the distinctive features of our model, and the challenges faced based on the experience gained in the development of a proof of concept.
URI: http://dspace.ucuenca.edu.ec/handle/123456789/37152
https://ieeexplore.ieee.org/abstract/document/7081092
metadata.dc.ucuenca.urifuente: https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=7081062&pageNumber=2
ISSN: 1558-1896
Appears in Collections:Artículos

Files in This Item:
File Description SizeFormat 
documento.pdfdocument434.47 kBAdobe PDFThumbnail
View/Open


This item is protected by original copyright



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Centro de Documentacion Regional "Juan Bautista Vázquez"

Biblioteca Campus Central Biblioteca Campus Salud Biblioteca Campus Yanuncay
Av. 12 de Abril y Calle Agustín Cueva, Telf: 4051000 Ext. 1311, 1312, 1313, 1314. Horario de atención: Lunes-Viernes: 07H00-21H00. Sábados: 08H00-12H00 Av. El Paraíso 3-52, detrás del Hospital Regional "Vicente Corral Moscoso", Telf: 4051000 Ext. 3144. Horario de atención: Lunes-Viernes: 07H00-19H00 Av. 12 de Octubre y Diego de Tapia, antiguo Colegio Orientalista, Telf: 4051000 Ext. 3535 2810706 Ext. 116. Horario de atención: Lunes-Viernes: 07H30-19H00