Conference paper Open Access

Telco Cloud Resilience: Synergies between Fault and Security Management

Gajic, Borislava; Trapero, Ruben; Michalopoulos, Diomidis

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.3267053</identifier>
      <creatorName>Gajic, Borislava</creatorName>
      <affiliation>Nokia Bell Labs, Munich, Germany</affiliation>
      <creatorName>Trapero, Ruben</creatorName>
      <affiliation>Atos Research and Innovation, Madrid, Spain</affiliation>
      <creatorName>Michalopoulos, Diomidis</creatorName>
      <affiliation>Nokia Bell Labs, Munich, Germany</affiliation>
    <title>Telco Cloud Resilience: Synergies between Fault and Security Management</title>
    <date dateType="Issued">2019-08-01</date>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.3267052</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution Non Commercial No Derivatives 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;This work capitalizes on the concept of network function virtualization at the telco cloud, and presents a joint study between fault management and security management. Specifically, the commonalities of fault and security management are put forward, along with a resource allocation study in common slice deployments. In this regard, a security threat analysis is presented, which sheds light onto the impact of security threats on network fault management. The interdependence between security and fault management is highlighted via three use cases, where distinct levels of resource trade-offs are identified. Along with such use cases, the paper provides also an overview of the resulting resource allocation process, where the requirements of the corresponding slice are analyzed towards an overall efficient resource usage.&lt;/p&gt;</description>
    <description descriptionType="Other">© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/761445/">761445</awardNumber>
      <awardTitle>5G Mobile Network Architecture for diverse services, use cases, and applications in 5G and beyond</awardTitle>
All versions This version
Views 3030
Downloads 4747
Data volume 12.0 MB12.0 MB
Unique views 2727
Unique downloads 3939


Cite as