Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3230833.3233255acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Identity and Access Control for micro-services based 5G NFV platforms

Published: 27 August 2018 Publication History
  • Get Citation Alerts
  • Abstract

    The intrinsic use of SDN/NFV technologies in 5G infrastructures promise to enable the flexibility and programmability of networks to ensure lower cost of network and service provisioning and operation, however it brings new challenges and requirements due to new architectural changes. In terms of security, authentication and authorization functions need to evolve towards the new and emerging 5G virtualization platforms in order to meet the requirements of service providers and infrastructure operators. Over the years, a lot of authentication techniques have been used. Now, a wide range of options arise allowing to extend existing authentication and authorization mechanisms.
    This paper focuses on proposing and showcasing a 5G platform oriented solution among different approaches to integrate authentication and authorization functionalities, an adapted secure and stateless mechanism, providing identity and permissions management to handle not only users, but also system micro-services, in a network functions virtualization management and orchestration (NFV MANO) system, oriented to deploy virtualized services. The presented solution uses the NFV-based SONATA Service Platform which offers capabilities for a continuous integration and delivery DevOps methodology that allow high levels of programmability and flexibility to manage the entire life cycle of Virtual Network Functions, and enables the perfect scenario to showcase different approaches for authentication and authorization mechanisms for users and micro-services in a 5G platform.

    References

    [1]
    View on 5G Architecture, 5G PPP Architecture Working Group
    [2]
    SONATA NFV: http://www.sonata-nfv.eu/, SONATA framework: https://github.com/sonata-nfv
    [3]
    Token-Based vs. Session-Based Authentication: A survey, Ijvesa Balaj, University of Prishtina, Prishtina, Kosovo
    [4]
    A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications, Obinna Ethelbert, Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour, Institute of Informatics, Georg-August-Universität, Göttingen, Germany
    [5]
    The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines, Daniel Fett, Ralf Küsters, and Guido Schmitz, University of Stuttgart, Germany
    [6]
    T-NOVA FP7, http://www.t-nova.eu/
    [7]
    UNIFY FP7 project, Unifying Cloud and Carrier Networks, http://www.fp7-unify.eu/
    [8]
    Access control in 5G communication networks using simple PKI certificates, Wided Boubakri, Walid Abdallah, Noureddine Boudriga, Communication Networks and Security Research Lab, University of Carthage, Tunisia
    [9]
    5G-ENSURE, 5G Enables for Network and System Security and Resilience, project funded by the EU Framework Programme for Research and Innovation H2020 under grant agreement No 671562, https://5gensure.eu/
    [10]
    The OAuth 2.0 Authorization Framework, Request for Comments: 6749, Internet Engineering Task Force (IETF), D. Hardt, Ed., October 2012, https://tools.ietf.org/html/rfc6749
    [11]
    OpenID Connect Core 1.0, N Sakimura, J. Bradley, M. Jones, B. de Medeiros, C. Mortimore, http://openid.net/specs/openid-connect-core-1_0.html
    [12]
    JSON Web Token (JWT), Internet Engineering Task Force (IETF), M. Jones, J. Bradley, N. Sakimura, https://tools.ietf.org/html/rfc7519
    [13]
    Keycloak, Open Source Identity and Access Management, https://www.keycloak.org/
    [14]
    SAML, Security Assertion Markup Language, https://www.oasis-open.org/standards#samlv1.0
    [15]
    Gatling, Load and performance testing for web applications, https://gatling.io/
    [16]
    https://5g-ppp.eu/wp-content/uploads/2015/02/5G-Vision-Brochure-v1.pdf

    Cited By

    View all
    • (2024)Identity and Access Management Architecture in the SILVANUS ProjectProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670935(1-9)Online publication date: 30-Jul-2024
    • (2023)Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System ArchitectureSymmetry10.3390/sym1506113415:6(1134)Online publication date: 23-May-2023
    • (2023)Enhancing Resource Sharing and Access Control for VNF Instantiation with BlockchainSensors10.3390/s2323934323:23(9343)Online publication date: 23-Nov-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
    August 2018
    603 pages
    ISBN:9781450364485
    DOI:10.1145/3230833
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Universität Hamburg: Universität Hamburg

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 August 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 5G
    2. Authentication
    3. Authorization
    4. DevOps
    5. JSON Web Token
    6. Keycloak
    7. NFV MANO
    8. identity
    9. micro-services
    10. network services
    11. virtual network functions

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ARES 2018

    Acceptance Rates

    ARES '18 Paper Acceptance Rate 128 of 260 submissions, 49%;
    Overall Acceptance Rate 228 of 451 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)36
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Identity and Access Management Architecture in the SILVANUS ProjectProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670935(1-9)Online publication date: 30-Jul-2024
    • (2023)Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System ArchitectureSymmetry10.3390/sym1506113415:6(1134)Online publication date: 23-May-2023
    • (2023)Enhancing Resource Sharing and Access Control for VNF Instantiation with BlockchainSensors10.3390/s2323934323:23(9343)Online publication date: 23-Nov-2023
    • (2023)A Blockchain-based Resource Access Control and Sharing Mechanism in NFVProceedings of the 2023 International Conference on Electronics, Computers and Communication Technology10.1145/3637494.3637513(106-111)Online publication date: 17-Nov-2023
    • (2023)Formal Analysis of Access Control Mechanism of 5G Core NetworkProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623113(666-680)Online publication date: 15-Nov-2023
    • (2023)Energy Sector Digitilisation: A Security Framework Application for Role-Based Access Management2023 14th International Conference on Information, Intelligence, Systems & Applications (IISA)10.1109/IISA59645.2023.10345842(1-10)Online publication date: 10-Jul-2023
    • (2022)Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile NetworksSensors10.3390/s2301018923:1(189)Online publication date: 24-Dec-2022
    • (2022)Reorganizing Industry 4.0 Paradigms for Successful Execution of Digital Transformation StrategiesRecent Advances in Electrical Engineering, Electronics and Energy10.1007/978-3-031-08280-1_10(133-145)Online publication date: 2-Jul-2022
    • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021
    • (2021)Techniques for Securing 5G Network Services from attacks2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom53373.2021.00052(273-280)Online publication date: Oct-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media