Journal on Communications ›› 2019, Vol. 40 ›› Issue (11): 1-18.doi: 10.11959/j.issn.1000-436x.2019232
• Papers • Next Articles
Xianwei ZHU,Chaowen CHANG,Zhiqiang ZHU,Xi QIN
Revised:
2019-10-23
Online:
2019-11-25
Published:
2019-12-06
Supported by:
CLC Number:
Xianwei ZHU,Chaowen CHANG,Zhiqiang ZHU,Xi QIN. SDN control and forwarding method based on identity attribute[J]. Journal on Communications, 2019, 40(11): 1-18.
[1] | MCKEOWN N , . Software-defined networking[C]// IEEE International Conference on Computer Communications. 2009: 30-32. |
[2] | 王蒙蒙, 刘建伟, 陈杰 ,等. 软件定义网络:安全模型、机制及研究进展[J]. 软件学报, 2016,27(4): 969-992. |
WANG M M , LIU J W , CHEN J ,et al. Software defined networking:security model,threats and mechanism[J]. Journal of Software, 2016,27(4): 969-992. | |
[3] | AFOLABI I , TALEB T , SAMDANIS K ,et al. Network slicing and softwarization:a survey on principles,enabling technologies,and solutions[J]. IEEE Communications Surveys & Tutorials, 2018,20(3):1. |
[4] | PORRAS P , SHIN S , YEGNESWARAN V ,et al. A security enforcement kernel for OpenFlow networks[C]// The First Workshop on Hot Topics in Software Defined Networks. ACM, 2012: 121-126. |
[5] | 冯登国, 陈成 . 属性密码学研究[J]. 密码学报, 2014,1(1): 1-12. |
FENG D G , CHEN C . Research on attribute-based cryptography[J]. Journal of Cryptologic Research, 2014,1(1): 1-12. | |
[6] | TAKAHASHI N , KODAIRA S , TSURU T ,et al. Seismic structure and seismogenesis off Sanriku region,northeastern Japan[J]. Geophysical Journal of the Royal Astronomical Society, 2018,159(1): 129-145. |
[7] | PORRAS P , CHEUNG S , FONG M ,et al. Securing the software-defined network control layer[C]// Annual Network and Distributed System Security Symposium. 2015. |
[8] | SHIN S , SONG Y , LEE T ,et al. Rosemary:a robust,secure,and high-performance network operating system[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014: 78-89. |
[9] | SHIN S , PORRAS P , YEGNESWARAN V ,et al. FRESCO:modular composable security services for software-defined networks[J]. Proceedings of Network & Distributed Security Symposium, 2013. |
[10] | WEN X , CHEN Y , HU C ,et al. Towards a secure controller platform for OpenFlow applications[C]// The Second ACM SIGCOMM workshop on Hot Topics in Software Defined Networking. ACM, 2016: 171-172. |
[11] | CASADO M , FREEDMAN M J , PETTIT J ,et al. Ethane:taking control of the enterprise[C]// ACM Sigcomm Conference on Applications. ACM, 2007: 1-12. |
[12] | 郑鹏, 胡成臣, 李昊 . 基于流量特征的 OpenFlow 南向接口开销优化技术[J]. 计算机研究与发展, 2018,55(s2): 346-357. |
ZHEN P , HU C C , LI H . Reducing the southbound interface overhead for OpenFlow based on the flow volume characteristics[C]// Journal of Computer Research and Development, 201855(s2): 346-357. | |
[13] | BALLARD J R , RAE I , AKELLA A . Extensible and scalable network monitoring using OpenSAFE[C]// Internet Network Management Conference on Research on Enterprise Networking. USENIX Association, 2010:8. |
[14] | WUNDSAM A , LEVIN D , SEETHARAMAN S ,et al. OFRewind:enabling record and replay troubleshooting for networks[C]// Usenix Conference on Usenix Technical Conference. USENIX Association, 2011:29. |
[15] | HALPERN E J , PIGNATARO E C . Service function chaining (SFC) architecture[C]// Internet Engineering Task Force. 2015. |
[16] | 赵志远, 孟相如, 苏玉泽 ,等. 多控制器条件下区分 QoS 的虚拟SDN映射方法[J]. 通信学报, 2017,38(8): 101-110. |
ZHAO Z Y , MENG X R , SU Y Z ,et al. Virtual SDN embedding with differentiated QoS under multiple controller[J]. Journal on Communication, 2017,38(8): 101-110. | |
[17] | 毕军 . SDN 体系结构与未来网络体系结构创新环境[J]. 电信科学, 2013,29(8): 6-15. |
BI J . SDN architecture and future network innovation environment[J]. Telecommunications Science, 2013,29(8): 6-15. | |
[18] | DARGAHI T , CAPONI A , AMBROSIN M ,et al. A survey on the security of stateful SDN data planes[J]. IEEE Communications Surveys & Tutorials, 2017,19(3): 1701-1725. |
[19] | LU G , SHI Y , GUO C ,et al. CAFE:a configurable packet forwarding engine for data center networks[C]// ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow. DBLP, 2009: 25-30. |
[20] | ATTIG M , BREBNER G . 400 GB/s programmable packet parsing on a single FPGA[C]// IEEE, 2011: 12-23. |
[21] | 金子晋, 兰巨龙, 江逸茗 ,等. SDN环境下基于QLearning算法的业务划分路由选路机制[J]. 网络与信息安全学报, 2018,4(9): 17-22. |
JIN Z J , LAN J L , JIANG Y M ,et al. QLearning based business differentiating routing mechanism in SDN architecture[J]. Chinese Journal of Network and Information Security, 2018,4(9): 17-22. | |
[22] | PORRAS P , SHIN S , YEGNESWARAN V ,et al. A security enforcement kernel for OpenFlow networks[C]// The First Workshop on Hot Topics in Software Defined Networks. ACM, 2012: 121-126. |
[23] | SHIN S W , PORRAS P , YEGNESWARA V ,et al. Fresco:modular composable security services for software-defined networks[C]// 20th Annual Network & Distributed System Security Symposium. NDSS, 2013. |
[24] | 周启钊, 于俊清, 李冬 . SDN环境下SAVI动态配置技术研究[J]. 通信学报, 2018,39(S1): 241-249. |
ZHOU Q C , YU G Q , LI D . Dynamic source address validation in software defined network[J]. Journal on Communications, 2018,39(S1): 241-249. | |
[25] | KHADER D . Attribute based group signatures[J]. IACR Cryptology ePrint Archive, 2007,2007:159. |
[26] | GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. ACM, 2006: 89-98. |
[27] | CASADO M , FREEDMAN M J , PETTIT J ,et al. Ethane:taking control of the enterprise[C]// ACM SIGCOMM Computer Communication Review. ACM, 2007,37(4): 1-12. |
[28] | CASADO M , GARFINKEL T , AKELLA A ,et al. SANE:a protection architecture for enterprise networks[J]. USENIX Security Symposium, 2006,49: 137-151. |
[29] | PANG R , ALLMAN M , BENNETT M ,et al. A first look at modern enterprise traffic[C]// The 5th ACM SIGCOMM Conference on Internet Measurement. USENIX Association, 2005:2. |
[30] | BONEH D , BOYEN X , SHACHAM H . Short group signatures[C]// Annual International Cryptology Conference. Springer, 2004: 41-55. |
[31] | POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3): 361-396. |
[32] | REN Y , DING N , WANG T ,et al. New algorithms for verifiable out sourcing of bilinear pairings[J]. Science China Information Sciences, 2017,59(9): 99-103. |
[33] | WANG M , LIU J , CHEN J ,et al. PERM-GUARD:authenticating the validity of flow rules in software defined networking[C]// International Conference on Cyber Security and Cloud Computing. IEEE, 2017: 1-17. |
[1] | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG. HDFS-oriented cryptographic key resource control mechanism [J]. Journal on Communications, 2022, 43(9): 27-41. |
[2] | Jiangtao DONG, Peiwen YAN, Ruizhong DU. Verifiable access control scheme based on unpaired CP-ABE in fog computing [J]. Journal on Communications, 2021, 42(8): 139-150. |
[3] | Chaowen CHANG, Jianshu JIN, Peisheng HAN, Xianwei ZHU. Software-defined network packet forwarding verification scheme based on attribute-based signatures identification [J]. Journal on Communications, 2021, 42(6): 131-144. |
[4] | Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU. Attribute-based revocable collaborative access control scheme [J]. Journal on Communications, 2021, 42(5): 75-86. |
[5] | Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU. Blockchain-based distributed EHR fine-grained traceability scheme [J]. Journal on Communications, 2021, 42(5): 205-215. |
[6] | Ruizhong DU, Peiwen YAN, Yan LIU. Fine-grained attribute update and outsourcing computing access control scheme in fog computing [J]. Journal on Communications, 2021, 42(3): 160-170. |
[7] | Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI. Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing [J]. Journal on Communications, 2021, 42(10): 81-94. |
[8] | Tianyi ZHU,Fenghua LI,Wei JIN,Yunchuan GUO,Liang FANG,Lin CHENG. Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy [J]. Journal on Communications, 2020, 41(9): 29-48. |
[9] | Qinglei ZHOU,Shaohuan BAN,Yingjie HAN,Feng FENG. Mimic defense authentication method for physical access control [J]. Journal on Communications, 2020, 41(6): 80-87. |
[10] | Chunfu JIA,Guanxiong HA,Ruiqi LI. Data access control policy of encrypted deduplication system [J]. Journal on Communications, 2020, 41(5): 72-83. |
[11] | Yonggui FU,Jianming ZHU. Design for database access control mechanism based on blockchain [J]. Journal on Communications, 2020, 41(5): 130-140. |
[12] | Zheng GUAN,Lei XIONG,Yao JIA,Min HE,Zhijun YANG. Research on scheduled WLAN MAC protocol with failure retries on RoF-DAS architecture [J]. Journal on Communications, 2020, 41(3): 102-111. |
[13] | Rongna XIE,Hui LI,Guozhen SHI,Yunchuan GUO. Attribute-based lightweight reconfigurable access control policy [J]. Journal on Communications, 2020, 41(2): 112-122. |
[14] | Aodi LIU, Xuehui DU, Na WANG, Rui QIAO. ABAC access control policy generation technique based on deep learning [J]. Journal on Communications, 2020, 41(12): 8-20. |
[15] | Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG. Blockchain-based access control mechanism for data traceability [J]. Journal on Communications, 2020, 41(12): 82-93. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|