4.5 Article

B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain

出版社

ELSEVIER
DOI: 10.1016/j.jisa.2021.103080

关键词

SDN security; Access control policy; Northbound interface; Blockchain adoption

资金

  1. Vingroup Joint Stock Company
  2. Domestic Master/PhD Scholarship Programme of Vingroup Innovation Foundation (VINIF) , Vingroup Big Data Institute (VINBIGDATA)
  3. [VINIF.2020]

向作者/读者索取更多资源

Software-Defined Network (SDN) is a network architecture that separates the control plane and data plane, providing orchestration features. While it brings benefits, SDN is vulnerable to attacks. To address this, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control to protect network resources.
Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element. Even though it brings several benefits, SDN is vulnerable to a diversity of attacks. Abusing the single point of failure in the SDN controller component, hackers can shut down all network operations. More specifics, a malicious OpenFlow application can access to SDN controller to carry out harmful actions without any limitation owing to the lack of the access control mechanism as a standard in the Northbound. The sensitive information about the whole network such as network topology, flow information, and statistics can be gathered and leaked out. Even worse, the entire network can be taken over by the compromised controller. Hence, it is vital to build a scheme of access control for SDN's Northbound. Furthermore, it must also protect the data integrity and availability during data exchange between application and controller. To address such limitations, we introduce B-DAC, a blockchain-based framework for decentralized authentication and fine-grained access control for the Northbound interface to assist administrators in managing and protecting critical resources. With strict policy enforcement, B-DAC can perform decentralized access control for each request to keep network applications under surveillance for preventing over-privileged activities or security policy conflicts. To demonstrate the feasibility of our approach, we also implement a prototype of this framework to evaluate the security impact, effectiveness, and performance through typical use cases.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据