SDN-Based Security Enforcement Framework For Data Sharing Systems of Smart Healthcare
SDN-Based Security Enforcement Framework For Data Sharing Systems of Smart Healthcare
SDN-Based Security Enforcement Framework For Data Sharing Systems of Smart Healthcare
1, MARCH 2020
Abstract—As novel healthcare paradiagm, smart healthcare advanced data analyzing services, consultant physicians can
can provide more efficient and high quality medical services for monitor patient’s health status in real time and predict some
patients. However, smart healthcare needs patients to share their diseases (e.g., cancers, infections, cardiac diseases and etc.)
physiological information for online diagnoses, if the data sharing
system of smart healthcare lacks effective security mechanisms, before they really occur. (2) More comfortable and cost reduc-
these sensitive information might be abused by illegal or mali- tion. By means of remote monitoring technologies, patients
cious users. Moreover, smart healthcare needs to confront some can enjoy the best medical services just staying at home,
brand-new challenges, such as resource-constrained IoT things, which can help patients reduce large amount of hospitaliza-
identity theft attacks and insider attacks. To tackle these prob- tion cost. (3) Better information management and international
lems, we propose a SDN-based security enforcement framework
for data sharing systems of smart healthcare. In our framework, collaborations. Patients can obtain their comprehensive health
each patient has a dedicated virtual machine in data sharing information on past, present and future by accessing the med-
system, each virtual machine provides a group data services ical data center in anywhere and anytime. In addition, their
which can be released to those authorized service consumers electronic medical records (EMR), electronic health records
or IoT things. In additon, virtual machine is protected by the (EHR) and electronic medical images (EMI) stored in cloud
SDN-based gateway which provides a firewall mechanism and
guarantees only authorized things can access patient’s virtual can be shared with global medical experts rapidly, which can
machine. Since each thing has a unique MAC address, thus accelerate the diagnoses of some difficult diseases. That is
our framework can effectively authenticate resource-constrained because of so much unprecedented advantages, Grand View
IoT things and tackle the problems caused by identity theft. To Research predicts that the global market of smart healthcare
validate the effectiveness and feasibility of our framework, we will appear explosive growth in next decades, especially in
implement an experimental system using POX controller and
Mininet emulator. The experimental results illustrate our frame- north America, it will be expanded to 300 Billion U.S. dol-
work is effective under different test scenarios. As increasing the lar by 2022 [2]. However, smart healthcare needs patients to
scale of information flow model, the framework can still work share their physiological information for real-time monitor-
well and its performance can be still acceptable. ing or online analyzing. Since all physiological information
Index Terms—Smart healthcare, SDN, access control, virtual are of extremely sensitive information for patients, thus if the
machine, firewall. data sharing system of smart healthcare lacks effective secu-
rity mechanisms, these information might be accessed by those
illegal users or malicious insiders, whereby it will incur serious
privacy leakage accidents and cause more serious psycholog-
I. I NTRODUCTION
ical harms to patients. According to the survey [6], only in
S NOVEL healthcare paradiagm, smart healthcare
A can provide more efficient and high quality medical
services for patients. Specifically, the benefits of adopt-
the United States, the economic losses due to medical identity
theft has been nearly 41.3 billion dollars per year. And more
than 78% participants worry about the leakage or misusing of
ing smart healthcare can be concluded as three perspec- their medical personal information [6].
tives [1], [2], [3], [4], [5]: (1) Lifetime monitoring and Moreover, compared with traditional networks, data sharing
disease prediction. In smart healthcare, patient’s physiologi- system of smart healthcare need to confront some brand-new
cal information collected by body sensors will be sent to the challenges. First, smart healthcare is a giant system based on
data sharing system for monitoring or diagnoses. By means of Internet of Things (IoT), thus a large amount of data in sharing
Manuscript received October 1, 2018; revised February 2, 2019, June 15, system are produced by IoT things, such as medical devices
2019, and September 2, 2019; accepted September 10, 2019. Date of publica- or body sensors. The services tightly coupled with IoT things
tion September 13, 2019; date of current version March 11, 2020. This paper are always called as real-world services [7], [8]. By means
has been sponsored and supported by National Natural Science Foundation of
China (Grant No.61772270), partially supported by National Natural Science of real-world services, service consumers can get information
Foundation of China (Grant No.61602262). The associate editor coordinat- from things in real time or send instructions to operate an IoT
ing the review of this article and approving it for publication was C. Fung. thing remotely. Thus, data sharing system of smart healthcare
(Corresponding author: Yunfei Meng.)
Y. Meng, Z. Huang, and G. Shen are with the College of Computer not only need to consider the accesses of human, but also need
Science and Technology, Nanjing University of Aeronautics and Astronautics, to consider the accesses of IoT things. Due to constrained
Nanjing 211106, China (e-mail: [email protected]). resources, how to effectively authenticate IoT things is a big
C. Ke is with the College of Computer Science and Technology, Nanjing
University of Post and Telecommunications, Nanjing 210003, China. challenge for data sharing system because it is nearly impos-
Digital Object Identifier 10.1109/TNSM.2019.2941214 sible for a sensor to send a password or verification code to
1932-4537 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
MENG et al.: SDN-BASED SECURITY ENFORCEMENT FRAMEWORK FOR DATA SHARING SYSTEMS OF SMART HEALTHCARE 309
system. Second, encryption-based data sharing mechanisms, Grammar: The grammar of P-Spec language is defined as a
such as attribute-based encryption (ABE) [9], [10], [11], [12], 4-tuple: G P −Spec = N , T , R, S, where S is the start symbol
are insufficient to define fine-grained data operations, i.e., if a of P-Spec language. N = { Subject, Policy } is the finite set
user decrypts an encrypted file, then the user can do anything of nonterminal symbols. T is the finite set of terminal symbols.
towards the decrypted file. But in some cases, we hope some Let T = {OP, K, V, C}, where OP = {=, +, ||, →, (, )}
data can only be explored online, can’t be copied or down- is the finite set of operation symbols, = represents semantical
loaded by users. Third, authentication-based access control equal, + represents logical and, || represents logical or, and →
techniques [13], [14], [15], [16], such as role-based access con- represents logical imply to. K is the finite set of keywords. V is
trol (RBAC) [17] or identity-based access control (IBAC) [18], the finite set of variables. C is the finite set of policy words. R
are vulnerable when facing identity theft, that is if a legal is the finite set of production rules, each production rule of R
user’s identities (private key) have been cracked by an attacker, is a relation from N to (N ∪T )∗ , where the asterisk represents
then attacker will obtain all of legal authorizations accordingly. the Kleene star operation. Given ϕ ∈ N , k ∈ K, v ∈ V, c ∈
To tackle these problems, we are motivated by the fol- C, thus R can be defined with backus naur forms as follows.
lowing efforts. First, each patient should have a dedicated
virtual machine in data sharing system. Since virtual machine ϕ ::= v = c
is an enclosed system, thus only patients can access their k = v |k = c|(ϕ)|ϕ||ϕ|ϕ + ϕ|ϕ → ϕ (1)
personal data stored in virtual machine, while any others
P-Spec Language: The P-Spec language is defined as a set:
(including storage provider) can not. Meanwhile, each vir- ∗
L(G P −Spec ) = {ω ∈ T ∗ |S =⇒ ω}, where T ∗ is the universal
tual machine provides a group data services for patient, and ∗
set of strings produced by T . S =⇒ ω represents from the start
patient can define which service could be accessed by which
symbol S, the string ω can be derived with relevant production
external service consumers or IoT thing. Second, patient’s
rules of R within limited steps.
virtual machine should be protected by a specific gateway.
In further step, any model of a formal language can be
The gateway provides a firewall mechanism which guaran-
defined as an interpretation under a specific universe of A
tees only the authorized IoT things can access patient’s virtual
for the formal language [20]. Hence, we have the following
machine while any unauthorized accesses will be prohibited
definitions.
automatically. Since each IoT thing has a unique MAC address
Interpretation: An interpretation of L(G P −Spec ) is a pair
and MAC is difficult to be captured and forged in wide area
A, I, where A is nonempty set and I is a func-
network (WAN), thus our framework can effectively authen-
tion which maps the N , T , R, S of L(G P −Spec ) into the
ticate those resource-constrained IoT things and tackle the
I(N ), I(T ), I(R), I(S) under A.
problems caused by identity theft attacks.
P-Spec Model: Given an interpretation of A, I, if A, I
In summary, this paper makes the following contributions:
has mapped the N , T , R, S of P-Spec language into the
(1) We propose a SDN-based security enforcement framework
I(N ), I(T ), I(R), I(S) under A. Thus, the P-Spec model
for data sharing system of smart healthcare. (2) We propose a
is defined as: MP −Spec = A, I(N ), I(T ), I(R), I(S),
service releasing policy by which service provider can strictly
where A is the universe (or domain) of model MP −Spec .
regulate which data service could be released to which service
consumer or IoT thing in system. (3) We propose a SDN-based
gateway to protect patient’s virtual machine in system, which B. Software Defined Networking
provides a firewall mechanism and can guarantee only legal Software-defined networking (SDN) is an approach which
service consumers or IoT things can access patient’s virtual facilitates network management and enables more efficient
machine, while others can not. (4) We implement a proof- network configurations [21]. The framework of SDN can
of-concept experimental system and evaluate the effectiveness be decomposed as application plane, control plane and data
and feasibility of our framework. plane [22]. SDN suggests to centralize network intelligence
The remainder of the paper is structured as follows. in one network component by decoupling the controlling pro-
Section II is preliminary, Section III is the proposed system cess (control plane) from the forwarding process (data plane).
model. Section IV is the main body of this paper, which OpenFlow switch is the core of data plane, which consists of
presents our framework in detail. Section V implements the three parts: flow table, OpenFlow protocol and secure chan-
framework and evaluates its effectiveness and performance. nel. The architecture of OpenFlow switch can be depicted in
Section VI discusses the threat models and countermeasures. Figure 1.
Section VII reviews some related works and compares them In this configuration, when a new packet arrives through in-
with our framework. Finally, Section VIII concludes this paper. ports, switch compares the header field of the packet against
all flow entries in flow table. If this packet matches an
existed entry, the switch updates its counters and executes
the associated actions of entry, otherwise the packet will be
II. P RELIMINARY
sent to SDN controller through secure channel. By means
A. P-Spec Policy Language of preloaded applications, the controller decides how to deal
We first propose P-Spec policy specification language with the incoming packets. If packets can to be forwarded,
in [19] and further develop it in this paper. The detailed controller inserts a new entry into flow table with relevant
definitions of the language are as follows. information of the packet, then forwards it. If packets need to
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
310 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 17, NO. 1, MARCH 2020
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
MENG et al.: SDN-BASED SECURITY ENFORCEMENT FRAMEWORK FOR DATA SHARING SYSTEMS OF SMART HEALTHCARE 311
users who have stolen the identities (private key) of legal con-
sumers from accessing patient’s virtual machine in system.
Specifically, SDN-based gateway layer can be further decom-
posed with SDN controller and OpenFlow virtual switches
(OVS). Firstly, any accesses to patient’s virtual machine will
be intercepted as suspicious flows by OVS and sent to the con-
troller for analyzing. Then, IFM-based virtual machine access
control algorithm integrated in the controller will check the
header fields of the incoming flow against those information
flow rules defined in IFM. If matching successfully, that indi-
cates the flow is sent from those authorized things, controller
will update the flow table in OVS and forwards the flow to
the patient’s virtual machine. If matching failed, the controller
will drop the incoming flow directly because the flow is sent
from those misusing or malicious consumers or IoT things.
In this way, our framework can guarantee only the authorized
IoT things in system can access patient’s VM, while those
unauthorized can not.
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
312 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 17, NO. 1, MARCH 2020
TABLE I TABLE II
E STABLISHED SRM IFM C ONVERTED F ROM SRM S HOWN IN TABLE I
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
MENG et al.: SDN-BASED SECURITY ENFORCEMENT FRAMEWORK FOR DATA SHARING SYSTEMS OF SMART HEALTHCARE 313
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
314 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 17, NO. 1, MARCH 2020
TABLE IV
E STABLISHED IFM OF T EST S CENARIO
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
MENG et al.: SDN-BASED SECURITY ENFORCEMENT FRAMEWORK FOR DATA SHARING SYSTEMS OF SMART HEALTHCARE 315
TABLE VI
A LL R ESPONSE T IME OF S IX G ROUP OF E XPERIMENTS
Fig. 5. The final result recorded in VM3 under executing iperf instruction from Physician1 and Physician3 at the same time. The red line represents the TCP
flow sent from Physician1, blue line represents the TCP flow sent from Physician3, black dash line is a boundary of loading new IFM into POX controller.
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
316 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 17, NO. 1, MARCH 2020
Fig. 7. Based on the recorded data shown in Table VI, we leverage the related MATLAB toolkits to create the corresponding cumulative distribution function
(CDF). From the result, we can observe that, as increasing the scale of IFM from 2 flow rules to 1000 flow rules, the response time of system is nearly linear
with respect to the number of flow rules in IFM.
by our gateway automatically because the MAC address of or DDoS attacks, the system will probably incur single-point-
hacker is different from the MAC address of Bob. Since MAC of-failure in some cases. Hence in the future, we need to
address is difficult to be captured and forged in wide area further improve the robustness of our framework by integrating
network (WAN), thus our framework can effectively authenti- the intrusion detecting functions towards DDoS attacks, such
cate those resource-constrained IoT things and prevent those as the toolkits introduced by the proposals of [28], [29]. In that
malicious users who have stolen the identities (private key) of way, when DDoS attack occurs, the gateway can timely detect
legal consumers from accessing to the virtual machines. the malicious access behaviors and block all of requests sent
Insider Attack: An insider attack is a malicious threat to from those malicious hosts automatically, whereby improve
an organization that comes from people within the orga- the robustness of our framework. Although we don’t address
nization, such as employees, former employees, contractors this concern in this paper, yet integrating such intrusion detect-
or business associates. The threats may involve fraud, the ing abilities into our framework will be an important task as
theft of confidential or commercially valuable information, our ongoing works.
the theft of intellectual property, or the sabotage of computer
systems [31]. Encryption-based access control mechanism is
one of countermeasures which can tackle the problems caused VII. R ELATED W ORK
by insider attacks. But encryption can’t prevent those autho- The SDN-based gateway of our framework provides a fire-
rized users from disclosing patient’s data because they can do wall mechanism which guarantees only authorized things can
anything towards those decrypted files. In our framework, each access service providers’s virtual machine, while those unde-
patient has dedicated virtual machines in system. Since virtual fined things can not. Hence, in this section, we want to discuss
machine is an enclosed system, thus only patient can access some research works concerning how to implement dynamic
to the data stored in VM while any others (including stor- firewall mechanism using SDN, and compare these proposals
age provider) can not. In virtual machine, patient can define with our framework.
fine-grained data operations for different authorized users by Hu et al. [33] proposed a comprehensive framework,
means of defining the service releasing policy (SRM). In this Flowguard, to facilitate accurate detection as well as flexible
case, if an authorized user is only granted to the right to read resolution of firewall policy violations in dynamic OpenFlow
online, then these data could not be disseminated by this user. networks. In addition, authors implemented a prototype using
Hence, our framework can well tackle the problems caused by Floodlight. The experimental results show that Flowguard
insider attacks. has the manageable performance overhead to enable realtime
However, there still exists some limitations in our present monitoring network. Similarly, Porras et al. [34] proposed a
framework. That is now we don’t consider the potential threats security enforcement controller, FortNOX, which is an exten-
caused by distributed denial of service (DDoS) attacks [27] sion on NOX controller. FortNOX is designed to enable a
or flooding attacks. Due to heavily depending on the SDN network flow to be blocked (or allowed) by security applica-
controller to defend those unauthorized accesses, thus the tions. They also proposed a conflict resolving mechanism used
controller might be a potential vulnerability in our present in case of appearing policy conflicts. Exactly, we are inspired
framework. Especially, when attackers launch flooding attacks by the ideas of Flowguard and FortNOX in some sense, we
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
MENG et al.: SDN-BASED SECURITY ENFORCEMENT FRAMEWORK FOR DATA SHARING SYSTEMS OF SMART HEALTHCARE 317
also design the relevant policy resolving mechanism in our consumer or which IoT thing. Next, we present SDN-based
framework, i.e., the information flow rules of administrator gateway in our framework which consists of information flow
(Role = A) can override those rules of users (Role = U). model (IFM) and IFM-based virtual machine access control
Moreover, we design all entries in OVS can be automatically algorithm. In order to evaluate the effectiveness and feasi-
updated per t minutes, which can also be used to resolve the bility of our framework, we implement a proof-of-concept
policy conflicts. experimental system using POX controller and Mininet emula-
Suh et al. [35] leveraged POX controller to implement a tor, and implement IFM-based virtual machine access control
firewall application. Each firewall rule can be defined by 6 algorithm with Python. The final results has proofed that our
actions and 12 conditions, and the final experimental results framework is truly effective after loading different test sce-
illustrate the firewall is effective. But this mechanism requires narios. When IFM is changed in run time, our framework can
network operators to know the details of underlying network, make effective dynamic responses towards these modifications,
and input the firewall rules into the controller manually. While and the latency of dynamic response is only 5 ∼ 6 seconds. In
in our framework, all of information flow rules of IFM are further, as increasing the scale of IFM from 2 rules up to 1000
converted from SRM automatically, service providers just need rules, our framework can still work well, the response time of
to know which service could be released to which consumer or system is increased linearly in accordance with the growing
which thing, other details of underlying network can be created number of information flow rules and all of time can be still
from system models automatically. Therefore, any normal user acceptable. Finally, we discuss the threat models towards the
can leverage our framework to rapidly define their security system and the relevant countermeasures.
policies. In our present framework, we don’t consider the potential
Koerner and Kao [36] proposed a MAC-based VLAN tag- threats caused by flooding attacks, especially the distributed
ging mechanism using SDN. The virtual local area network denial of service (DDoS) attacks. Thus, the SDN controller
(VLAN) has been widely used in enterprise networks where might be a potential vulnerability in our framework. Hence
the security policy is always defined by VLAN address. But in the future, we need to further improve the robustness of
some mobile laptop-based workstations often change their our framework by integrating with intrusion detecting func-
locations, which will leads to the frequent changing of its tions towards DDoS attacks. In that way, when DDoS attack
VLAN address and incur security policy conflicts. To address occurs, the gateway can timely detect the malicious behav-
this problem, authors leverage Floodlight controller to map the iors and block all of requests sent from those malicious hosts
MAC address of laptop into its corresponding VLAN address automatically.
in network. Since MAC address is static, thus it can guarantees
the laptops can access the network successfully in different
locations. In our framework, the controller use information
R EFERENCES
flow rule to recognize an authorized user, i.e., the pair Src,
Dst. Here Src is MAC address of service consumer, Dst is [1] B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, and
VLAN address of VM, but we don’t need to convert MAC K. Mankodiya, “Towards fog-driven IoT eHealth: Promises and chal-
lenges of IoT in medicine and healthcare,” Future Gener. Comput. Syst.,
address into a VLAN address. vol. 48, pp. 659–676, Jan. 2018.
In addition, Javid et al. [37] implemented a 2-layer firewall [2] F. Firouzi et al., “Internet-of-Things and big data for smarter healthcare:
using POX controller. CloudWatcher [38] is a security mon- From device to architecture, applications and analytics,” Future Gener.
Comput. Syst., vol. 78, pp. 583–586, Jan. 2018.
itoring framework by which network operators can define a [3] H. Alemdar and C. Ersoy, “Wireless sensor networks for healthcare: A
policy to describe a network traffic and describe which secu- survey,” Comput. Netw., vol. 54, no. 15, pp. 2688–2710, 2010.
rity services must be applied to it. Koorevaar [39] proposed [4] W. Sun, Z. Cai, Y. Li, L. Fang, S. Fang, and G. Wang, “Security and
an framework for leveraging SDN for automatic security pol- privacy in the medical Internet of Things: A review,” Security Commun.
Netw., vol. 2018, pp. 1–9, Mar. 2018.
icy enforcement using EEL-tags. These tags are added into [5] F. Firouzi, B. Farahani, M. Ibrahim, and K. Chakrabarty, “From
the VM’s flow by hypervisor. By means of these added EDA to IoT eHealth: Promises, challenges, and solutions,” IEEE
EEL tags, they can implement the associated security pol- Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 37, no. 12,
pp. 2965–2978, Dec. 2018.
icy. However, this work heavily relies on trustful hypervisor,
[6] (2011). EHR. [Online]. Available: http://healthcaremgmt.net/blog/2011/
thus the portability of method is a big problem need to be 08/are-you-educating-patients-on-ehr
considered. [7] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, “Interacting
with the SOA-based Internet of Things: Discovery, query, selection,
and on-demand provisioning of Web services,” IEEE Trans. Services
Comput., vol. 3, no. 3, pp. 223–235, Jul.–Sep. 2010.
VIII. C ONCLUSION
[8] I. R. Chen, J. Guo, and F. Bao, “Trust management for SOA-based
In this paper, we propose a SDN-based security enforce- IoT and its application to service composition,” IEEE Trans. Services
ment framework for data sharing system of smart healthcare. Comput., vol. 9, no. 3, pp. 482–495, May/Jun. 2016.
[9] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Int.
We first establish the system model of data sharing system. Conf. Theory Appl. Cryptograph. Techn., vol. 3494, 2005, pp. 457–473.
Then based on the system model, we present the SDN-based [10] L. Guo, C. Zhang, J. Sun, and Y. Fang, “A privacy-preserving attribute-
security enforcement framework in detail. We introduce an based authentication system for mobile health networks,” IEEE Trans.
Mobile Comput., vol. 13, no. 9, pp. 1927–1941, Sep. 2014.
important formal model, service releasing model (SRM), by
[11] A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, “Healing on the
which service provider can regulate which data services in cloud: Secure cloud architecture for medical wireless sensor networks,”
virtual machine could be released to which authorized service Future Gener. Comput. Syst., vol. 55, pp. 266–277, Feb. 2016.
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.
318 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 17, NO. 1, MARCH 2020
[12] X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen, “Healthshare: Yunfei Meng received the B.S. and M.S. degrees in
Achieving secure and privacy-preserving health information sharing computer science from Shandong University, China,
through health social networks,” Comput. Commun., vol. 35, no. 15, in 2001 and 2004, respectively. He is currently pur-
pp. 1910–1920, 2012. suing the Ph.D. degree with the College of Computer
[13] D. S. Allison, H. F. E. Yamany, and M. A. M. Capretz, “A fine-grained Science and Technology, Nanjing University of
privacy structure for service-oriented architecture,” in Proc. IEEE Int. Aeronautics and Astronautics, China. He ever was a
Comput. Softw. Appl. Conf., Seattle, WA, USA, 2009, pp. 634–635. Software Engineer with the Department of OSS/BSS
[14] Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, “Privacy-aware role based Enterprise Planning, Shandong Telecom Inc., China.
access control,” in Proc. 12th ACM Symp. Access Control Mod. Technol., His research interests mainly include privacy-aware
vol. 41, 2007. system, SDN/NFV techniques, cloud computing, and
[15] C. A. Ardagna, M. Cremonini, S. D. C. D. Vimercati, and P. Samarati, formal methods.
“A privacy-aware access control system,” J. Comput. Security, vol. 16,
no. 4, pp. 369–397, 2008.
[16] M. Li, X. Sun, H. Wang, Y. Zhang, and J. Zhang, “Privacy-aware access
control with trust management in Web service,” World Wide Web Internet
Web Inf. Syst., vol. 14, no. 4, pp. 407–430, 2011.
[17] R. Wonohoesodo and Z. Tari, “A role based access control for Web
services,” in Proc. IEEE Int. Conf. Services Comput., 2004, pp. 49–56.
[18] W. J. Tolone, G. J. Ahn, T. Pai, and S. P. Hong, “Access control in
collaborative systems,” ACM Comput. Surveys, vol. 37, no. 1, pp. 29–41,
2005.
[19] Y. Meng, Z. Huang, Z. Yu, and C. Ke, “Privacy-aware cloud ser-
vice selection approach based on P-spec policy models and privacy
sensitivities,” Future Gener. Comput. Syst., vol. 86, pp. 1–11, Sep. 2018. Zhiqiu Huang received the B.S. and M.S. degrees
[20] C. C. Chang and H. J. Keisler, Continuous Model Theory. Princeton, in computer science from the National University of
NJ, USA: Princeton Univ. Press, 1966. Defense Technology, China, and the Ph.D. degree
[21] K. Benzekki, A. El Fergougui, and A. E. Elalaoui, “Software-defined in computer science from the Nanjing University
networking (SDN): A survey,” Security Commun. Netw., vol. 9, no. 18, of Aeronautics and Astronautics, China, where he
pp. 5803–5833, 2016. is currently a Full Professor with the College of
[22] N. Mckeown et al., “OpenFlow: Enabling innovation in campus Computer Science and Technology. His research
networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, interests mainly include formal method, cloud com-
pp. 69–74, 2008. puting, network security, and privacy preservation.
[23] (2017). POX. [Online]. Available: https://github.com/noxrepo/pox
[24] (2018). NOX. [Online]. Available: https://github.com/noxrepo
[25] (2018). Floodlight. [Online]. Available: https://www.projectflood
light.org
[26] (2018). NSX. [Online]. Available: https://www.vmware.com/products/
nsx.html
[27] C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mecha-
nisms: Classification and state-of-the-art,” Comput. Netw., vol. 44, no. 5,
pp. 643–666, 2004.
[28] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack
detection using NOX/OpenFlow,” in Proc. IEEE Conf. Local Comput.
Netw., Denver, CO, USA, 2010, pp. 408–415.
[29] Y. Li, T.-B. Lu, L. Guo, Z.-H. Tian, and Q-W. Nie, “Towards lightweight Guohua Shen received the Ph.D. degree in com-
and efficient DDoS attacks detection for Web server,” in Proc. Int. Conf. puter science from the Nanjing University of
World Wide Web, 2009, pp. 1139–1140. Aeronautics and Astronautics, China, where he is
[30] B.-Z. He, C.-M. Chen, Y.-P. Su, and H.-M. Sun, “A defence scheme currently an Assistant Professor with the College
against identity theft attack based on multiple social networks,” Expert of Computer Science and Technology. His research
Syst. Appl., vol. 41, no. 5, pp. 2345–2352, 2014. interests mainly include semantic Web, cloud com-
[31] M. B. Salem, S. Hershkop, and S. J. Stolfo, “A survey of insider attack puting, and formal method.
detection research,” in Insider Attack and Cyber Security. Boston, MA,
USA: Springer, 2008.
[32] (2012). Mininet. [Online]. Available: http://www.mininet.org
[33] H. Hu, W. Han, G.-J. Ahn, and Z. Zhao, “Flowguard: Building robust
firewalls for software-defined networks,” in Proc. ACM SIGCOMM
Workshop Hot Topics Softw. Defined Netw., 2014, pp. 97–102.
[34] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu,
“A security enforcement kernel for OpenFlow networks,” in Proc. 1st
Workshop Hot Topics Softw. Defined Netw., 2012, pp. 121–126.
[35] M. Suh, S. H. Park, B. Lee, and S. Yang, “Building firewall over the
software-defined network controller,” in Proc. Int. Conf. Adv. Commun.
Technol., 2014, pp. 744–748.
[36] M. Koerner and O. Kao, “MAC based dynamic VLAN tagging with Changbo Ke received the B.S. and M.S. degrees in
OpenFlow for WLAN access networks,” Procedia Comput. Sci., vol. 94, computer science from the Kunming University of
pp. 497–501, 2016. Science and Technology, China, in 2008 and 2010,
[37] T. Javid, T. Riaz, and A. Rasheed, “A layer2 firewall for software defined respectively, and the Ph.D. degree in computer sci-
network,” in Proc. IEEE Inf. Assurance Cyber Security, 2014, pp. 39–42. ence from the Nanjing University of Aeronautics
[38] S. Shin and G. Gu, “Cloudwatcher: Network security monitoring using and Astronautics, China, in 2014. He is currently
OpenFlow in dynamic cloud networks,” in Proc. IEEE Int. Conf. Netw. a Lecturer with the Nanjing University of Posts and
Protocols, Austin, TX, USA, 2012, pp. 1–6. Telecommunications, China. His research interests
[39] T. Koorevaar, “Dynamic enforcement of security policies in multi- mainly include security enforcement and privacy
tenant cloud networks,” M.S. thesis, Dept. Genie Comput., Genie Softw. preservation of information system, and cloud com-
Polytech. School, Univ. Montreal, QC, Canada, 2012. puting and ontology-based software engineering.
Authorized licensed use limited to: SLIIT - Sri Lanka Institute of Information Technology. Downloaded on May 01,2023 at 16:07:07 UTC from IEEE Xplore. Restrictions apply.