Skip to main navigation Skip to search Skip to main content

Virtualized Security at the Network Edge: A User-Centric Approach

  • Diego Montero
  • , Marcelo Yannuzzi
  • , Adrian Shaw
  • , Ludovic Jacquin
  • , Antonio Pastor
  • , René Serral-Gracià
  • , Antonio Lioy
  • , Fulvio Risso
  • , Cataldo Basile
  • , Roberto Sassu
  • , Mario Nemirovsky
  • , Francesco Ciaccia
  • , Michael Georgiades
  • , Savvas Charalambides
  • , Jarkko Kuusijärvi
  • , Francesca Bosco
  • Polytechnic University of Catalonia
  • Hewlett-Packard
  • Telefonica
  • Polytechnic University of Turin
  • ICREA
  • Barcelona Supercomputing Center
  • Primetel
  • VTT Technical Research Centre of Finland Ltd.
  • United Nations Interregional Crime and Justice Research Institute

Research output: Contribution to journalArticlepeer-review

45 Scopus citations

Abstract

The current device-centric protection model against security threats has serious limitations. On one hand, the proliferation of user terminals such as smartphones, tablets, notebooks, smart TVs, game consoles, and desktop computers makes it extremely difficult to achieve the same level of protection regardless of the device used. On the other hand, when various users share devices (e.g., parents and kids using the same devices at home), the setup of distinct security profiles, policies, and protection rules for the different users of a terminal is far from trivial. In light of this, this article advocates for a paradigm shift in user protection. In our model, protection is decoupled from users' terminals, and it is provided by the access network through a trusted virtual domain. Each trusted virtual domain provides unified and homogeneous security for a single user irrespective of the terminal employed. We describe a user-centric model where nontechnically savvy users can define their own profiles and protection rules in an intuitive way. We show that our model can harness the virtualization power offered by next-generation access networks, especially from network functions virtualization in the points of presence at the edge of telecom operators. We also analyze the distinctive features of our model, and the challenges faced based on the experience gained in the development of a proof of concept.

Original languageEnglish
Article number7081092
Pages (from-to)176-186
Number of pages11
JournalIEEE Communications Magazine
Volume53
Issue number4
DOIs
StatePublished - 1 Apr 2015
Externally publishedYes

Fingerprint

Dive into the research topics of 'Virtualized Security at the Network Edge: A User-Centric Approach'. Together they form a unique fingerprint.

Cite this