Citation: | Yuhang QIU, Gongming ZHAO, Hongli XU, et al., “Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds,” Chinese Journal of Electronics, vol. 34, no. 1, pp. 1–15, 2025 doi: 10.23919/cje.2023.00.387 |
[1] |
Huawei, “Virtual private cloud,” Available at: https://support.huaweicloud.com/vpc/index.html, 2023-11-23. (in Chinese).
|
[2] |
J. S. Jensen, T. B. Krøgh, J. S. Madsen, et al., “P-Rex: Fast verification of MPLS networks with multiple link failures,” in Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies, Heraklion, Greece, pp. 217–227, 2018.
|
[3] |
S. Prabhu, K. Y. Chou, A. Kheradmand, et al., “Plankton: Scalable network configuration verification through model checking,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 953–967, 2020.
|
[4] |
“Network intelligence center,” Available at: https://nice.sist. shanghaitech.edu.cn/, 2023-08-01.
|
[5] |
P. Kazemian, M. Chang, H. Y. Zeng, et al., “Real time network policy checking using header space analysis,” in Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, Lombard, IL, USA, pp. 99–111, 2013.
|
[6] |
F. D. Ye, D. Yu, E. N. Zhai, et al., “Accuracy, scalability, coverage: A practical configuration verifier on a global wan,” in Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication, Virtual Event, USA, pp. 599–614, 2020.
|
[7] |
K. Jayaraman, N. Bjørner, J. Padhye, et al., “Validating datacenters at scale,” in Proceedings of the ACM Special Interest Group on Data Communication, Beijing, China, pp. 200–213, 2019.
|
[8] |
A. Horn, A. Kheradmand, and M. Prasad, “Delta-net: Real-time network verification using atoms,” in Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, pp. 735–749, 2017.
|
[9] |
P. Zhang, H. Li, C. C. Hu, et al., “Mind the gap: Monitoring the control-data plane consistency in software defined networks,” in Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, Irvine, CA, USA, pp. 19–33, 2016.
|
[10] |
H. Y. Zeng, S. D. Zhang, F. Ye, et al., “Libra: Divide and conquer to verify forwarding tables in huge networks,” in Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, Seattle, WA, USA, pp. 87–99, 2014.
|
[11] |
A. Khurshid, W. X. Zhou, M. Caesar, et al., “VeriFlow: Verifying network-wide invariants in real time,” in Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, Lombard, IL, USA, pp. 49–54, 2012.
|
[12] |
P. Zhang, X. Liu, H. K. Yang, et al., “APKeep: Realtime verification for real networks,” in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 241–255, 2020.
|
[13] |
A. Abhashkumar, A. Gember-Jacobson, and A. Akella, “Tiramisu: Fast multilayer network verification,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 201–219, 2020.
|
[14] |
P. Zhang, Y. H. Huang, A. Gember-Jacobson, et al., “Incremental network configuration verification,” in Proceedings of the 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, pp. 81–87, 2020.
|
[15] |
P. Zhang, A. Gember-Jacobson, Y. S. Zuo, et al., “Differential network analysis,” in Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, Renton, WA, USA, pp. 601–615, 2022.
|
[16] |
R. H. Aswathy and N. Malarvizhi, “A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 5097–5106, 2023. doi: 10.1007/s12652-020-02788-0
|
[17] |
C. A. Corral and H. Thornquist, “Combined CRC and bit framing for enhanced error detection,” in Proceedings of the SoutheastCon 2023, Orlando, FL, USA, pp. 571–577, 2023.
|
[18] |
T. C. Maxino and P. J. Koopman, “The effectiveness of checksums for embedded control networks,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 1, pp. 59–72, 2009. doi: 10.1109/TDSC.2007.70216
|
[19] |
A. M. Ali and A. K. Farhan, “A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document,” IEEE Access, vol. 8, pp. 80290–80304, 2020. doi: 10.1109/ACCESS.2020.2989050
|
[20] |
F. E. De Guzman, B. D. Gerardo, and R. P. Medina, “Implementation of enhanced secure hash algorithm towards a secured web portal,” in Proceedings of 2019 IEEE 4th International Conference on Computer and Communication Systems, Singapore, Singapore, pp. 189–192, 2019.
|
[21] |
G. E. Pibiri and R. Venturini, “Techniques for inverted index compression,” ACM Computing Surveys, vol. 53, no. 6, article no. 125, 2020. doi: 10.1145/3415148
|
[22] |
A. Fogel, S. Fung, L. Pedrosa, et al., “A general approach to network configuration analysis,” in Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, Oakland, CA, USA, pp. 469–483, 2015.
|
[23] |
“KubeSkoop,” Available at: https://kubeskoop.io/zh/, 2023-08-01.
|