Next Article in Journal
A Nondestructive Methodology for Determining Chemical Composition of Salvia miltiorrhiza via Hyperspectral Imaging Analysis and Squeeze-and-Excitation Residual Networks
Next Article in Special Issue
Edge IoT Prototyping Using Model-Driven Representations: A Use Case for Smart Agriculture
Previous Article in Journal
Hybrid Control of the DC Microgrid Using Deep Neural Networks and Global Terminal Sliding Mode Control with the Exponential Reaching Law
Previous Article in Special Issue
Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain

1
College of Computer Science and Engineering, Northeastern University, Shenyang 110169, China
2
College of Medicine and Biological Information Engineering, Northeastern University, Shenyang 110016, China
3
College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(23), 9343; https://doi.org/10.3390/s23239343
Submission received: 21 October 2023 / Revised: 18 November 2023 / Accepted: 20 November 2023 / Published: 23 November 2023
(This article belongs to the Special Issue Edge Intelligence: Challenges and Opportunities)

Abstract

:
In the realm of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) are crucial software entities that require execution on virtualized hardware infrastructure. Deploying a Service Function Chain (SFC) requires multiple steps for instantiating VNFs to analyze, request, deploy, and monitor resources. It is well recognized that the sharing of infrastructure resources among different VNFs will enhance resource utilization. However, conventional mechanisms for VNF sharing often neglect the interests of both VNF instances and infrastructure providers. In this context, this paper presents a blockchain-based framework that focuses on resource sharing and access control, with a particular emphasis on ensuring profitability during VNF instantiation. Additionally, a resource sharing game model and a novel greedy matching algorithm are introduced to optimize the benefits for both VNF instances and infrastructure resource providers. Furthermore, a blockchain-based access control mechanism is designed to securely store keys and provide fine-grained access control. The experimental results demonstrate that the proposed resource sharing game model and greedy matching algorithm promote healthy competition among resource owners and facilitate effective bargaining between resource owners and infrastructure providers. In comparison to the standard Stackelberg game solution, our proposed method achieves up to an 8.1 times performance improvement while sacrificing fewer optimal social utility values. Furthermore, compared to other CP-ABE methods, the proposed approach enhances security within a blockchain-based framework while maintaining an excellent encryption efficiency and a moderate decryption efficiency.

1. Introduction

Network Function Virtualization (NFV) offers a flexible and scalable approach for the deployment and management of network functions. In the traditional paradigm, network functions were reliant on dedicated hardware devices. However, NFV decouples these functions from specialized hardware, enabling them to operate as software on general-purpose servers [1]. Consequently, various network functions within an IP network can now be configured and managed with increased flexibility and efficiency.
Through the adoption of NFV, network operators and providers gain the ability to easily adjust, upgrade, and introduce new services without being tied to specific hardware dependencies. This adaptability is pivotal for meeting evolving network demands and accommodating increasing traffic. Consequently, integrating NFV with IP networks represents an innovative approach for constructing a more intelligent, flexible, and scalable network infrastructure.
VNFs necessitate execution on virtualized hardware infrastructure, such as virtual machines, containers, or other virtualization platforms, as discussed in a comprehensive review by Kaur et al. [2]. When implementing a Service Function Chain (SFC) within this context, VNFs must go through distinct steps during instantiation.
Requirements Analysis and Planning: This initial phase involves identifying essential VNFs and determining the computing, storage, networking, and other resource requirements for each VNF.
Resource Request: The request for resources, including CPU, memory, and bandwidth, that are necessary for VNFs, must be submitted to the infrastructure or cloud service provider.
Resource Allocation: Resource allocation is carried out based on the submitted resource requests and the availability of resources.
VNF Deployment: After resource allocation, the VNFs are deployed into their designated virtualized instances, such as virtual machines or containers.
Configuration and Optimization: Each VNF undergoes configuration and optimization to ensure the efficient utilization of allocated resources and optimal performance.
Monitoring and Management: Regular and systematic monitoring of VNF performance, resource utilization, and security is a non-negotiable imperative. This enables timely adjustments and optimizations, contributing to the robustness of the entire NFV ecosystem.
In conventional NFV deployments, individual VNFs typically monopolize underlying resources to preempt conflicts. In such instances, service providers deploying service function chains can bypass concerns about interactions among different VNFs, simplifying deployment into a straightforward rental model. However, with the expanding array of network functions, particularly in the context of the burgeoning 5G and evolving 6G networks, the deployment of intricate service function chains has garnered attention. This proliferation has given rise to diverse VNF types, creating a dynamic landscape. Due to fluctuating user demands for various network services at different times, service providers often allocate excess basic resources to ensure a seamless user experience during peak traffic periods. Unfortunately, this practice often leads to the wastage of resources and higher costs. Conversely, infrastructure providers grapple with limitations in managing complex network traffic and providing flexible resource configurations.
Current research in resource sharing [3,4,5,6,7,8,9,10,11,12,13] predominantly concentrates on two key dimensions. The first involves the judicious placement of VNFs, which requires determining the optimal locations and quantities within the network to maintain service quality and improve resource utilization. This encompasses an examination of infrastructure resource sharing among multiple VNFs co-located on the same node, with the overarching goal of achieving efficient infrastructure resource utilization. The second dimension centers on refining service chaining methodologies. This involves carefully scheduling data packets from various business chains on a shared VNF, enabling efficient resource sharing and promoting VNF sharing. Nevertheless, these methodologies often neglect the inherent interests among different VNF entities and infrastructure providers. As the adage goes, “all’s fair in love and war.” Devoid of appropriate incentives, even the most adept resource-sharing strategies pose implementation challenges. Hence, it becomes imperative to incorporate economic incentives into the VNF instantiation phase to maximize the benefits for both infrastructure providers and VNF entities involved in resource sharing.
Access control is a critical component in NFV, which function as a pivotal mechanism for safeguarding sensitive data and resources. This mechanism involves various operations that include different subjects, such as users, roles, services, etc. Its significance lies in its ability to regulate access to distinct objects, including files, devices, and services, while concurrently ensuring the integrity, confidentiality, and availability of resources [14]. In multi-tenant environments that share common infrastructure and resources, access control policies can be vulnerable to inconsistencies and conflicts. This can amplify concerns regarding resource isolation and protection. Within such contexts, the presence of malicious or unauthorized entities poses a looming threat, with the potential to compromise sensitive data, disrupt normal service operations, and instigate severe consequences. These consequences can range from data breaches to service interruptions and performance degradation.
Prior investigations in the field of NFV resource sharing have notably neglected the examination of robust access control strategies, despite their pivotal significance. Other research on access control [15,16,17,18] primarily focuses on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC). To ensure precise subject identification and verification within the NFV system, trusted identity management and authentication mechanisms are commonly deployed. These mechanisms utilize various tools, such as digital certificates, tokens, passwords, and similar techniques, as illustrated in Figure 1. Nevertheless, in many conventional approaches, it is common to rely on third-party involvement for key distribution. If the third party lacks trustworthiness, data security is severely compromised.
Blockchain is a decentralized and distributed ledger technology that enables secure and transparent record-keeping of transactions across a network. Each transaction, or “block”, is linked to the previous one through a cryptographic hash, which forms a chain of blocks. This immutability and consensus mechanism makes it extremely resistant to tampering or unauthorized alterations. Blockchain is most commonly associated with cryptocurrencies such as Bitcoin, where it serves as the underlying technology for a secure and decentralized financial system. However, its applications extend beyond finance to various industries, including supply chain management, healthcare, and smart contracts, offering enhanced transparency, traceability, and trust in digital transactions [19,20,21,22,23,24]. Notably, recent studies have explored the utilization of blockchain technology in fields associated with the placement, addressing, and resource allocation of VNFs [25,26,27,28].
Game theory, a mathematical discipline [29], delves into the strategic interactions among decision makers, commonly referred to as players, across diverse scenarios. This branch involves analyzing the choices made by players, known as strategies, and gaining a comprehensive understanding of the resulting outcomes and impacts on each participant. Whether in the realm of economic competition, political decision making, or biological interactions, game theory offers a versatile framework for examining situations wherein individuals or entities navigate decisions within dynamic and interactive environments. Its applications traverse disciplinary boundaries, providing valuable insights into cooperation, competition, and the intricate interplay of decisions within human and natural systems. Notably, in recent years, game theory has been frequently applied to delineate VNF chains and formulate strategies for the allocation of VNF resources [30,31,32,33,34,35].
In light of the previously discussed issues and challenges, this paper proposes a novel mechanism based on blockchain technology. This mechanism is specifically designed for resource sharing and access control during the VNF instantiation stage. The primary contributions of this research are as follows:
First, we present a comprehensive system framework for VNF resource sharing and access control based on blockchain. This framework delineates essential processes and methodologies for resource request and deployment during the VNF instantiation process.
Second, we delve into the intricate dynamics between VNF instances and infrastructure resource providers, which leads to the formulation of a resource-sharing game model. The primary goal is to optimize the benefits for both infrastructure resource providers and VNF instances involved in resource sharing. To operationalize this model, we introduce a greedy matching algorithm.
Third, we design and implement a blockchain-driven VNF attribute-encrypted access control mechanism. This mechanism leverages blockchain technology and attribute-based encryption, incorporating ciphertext policy enforcement. Furthermore, we integrate the use of a Bloom Filter to obscure the access policies of the instantiated VNF.
Ultimately, we conduct comprehensive simulation experiments using the Open Network Automation Platform (ONAP) and Ethereum to rigorously evaluate the proposed mechanism and its associated algorithms. The simulation results unequivocally confirm the effectiveness of the proposed mechanism, surpassing the performance benchmarks set by existing methodologies.
The subsequent sections of this paper are structured as follows: Section 2 provides a review of relevant prior research. Section 3 expounds upon the framework for the blockchain-based resource sharing and access control system. The formulation of the resource sharing game model and the accompanying greedy matching algorithm are presented in Section 4 and Section 5, respectively. Section 6 offers insights into the access control algorithm based on blockchain and attribute encryption. Section 7 is dedicated to the evaluation of performance, while the conclusion of this paper is concluded in Section 8.

2. Related Work

According to the findings of the literature survey, the strategic placement of VNFs encompasses a multifaceted approach. This entails a thorough analysis of the necessary resources, the formulation of strategies for resource allocation, the resolution of conflicts pertaining to resource sharing, the optimization of performance, the balancing of workloads, the dynamic adjustment of resources, and the implementation of secure isolation mechanisms. These efforts are all directed towards achieving the twin objectives of maximizing resource utilization and fulfilling network functionality requirements. Huang et al. [3] introduced AutoVNF, an automated mechanism for optimizing VNF deployment. This mechanism incorporated a resource-sharing mode and an automated resource allocation mechanism, which effectively support multiple VNFs sharing resources on a single node and dynamically allocating available nodes to VNF requests. Cohen et al. [4] proposed two approximate algorithms to address the VNF placement problem. One for cases without capacity constraints and another for cases with capacity constraints. The primary objectives of these algorithms were to minimize the distance between users and service nodes and to reduce the deployment cost of VNFs. Sun et al. [5] presented a method for optimizing the placement of VNFs. The method took into account the resource sharing among VNFs and the stochastic characteristics of Poisson arrival traffic. This approach utilized a queuing model to examine queueing delays within the VNF queue, thereby formulating the VNF placement problem as a 0–1 quadratic fractional programming challenge. This method addressed the complexities of balancing service quality and placement expenses across diverse traffic categories in resource-sharing VNFs. Savi et al. [6] introduced a method that leverages Integer Linear Programming (ILP) and Heuristic Computing Algorithm (HCA) for optimizing VNF placement and SFC embedding. This approach considered the performance loss due to the sharing of processing resources in a multi-core CPU architecture, which includes the associated cost increase and context-switching overhead. The main objective of this approach was to minimize the number of activated NFV nodes, thereby reducing the implementation cost associated with NFV.
With the widespread adoption of machine learning [36], numerous studies have been proposed to achieve intelligent VNF mapping. In their work, Sun et al. [7] advocated for a dynamic resource allocation scheme grounded in VNFs. This scheme leveraged online learning techniques to forecast user mobility patterns and allocate resources according to the heat generated by base stations. The authors introduced a supplementary mechanism that reallocates idle resources from demand-surplus base stations to demand-deficient ones. This mechanism prioritized the requirements of the latter group. Mu et al. [8] presented an approach based on Deep Reinforcement Learning (DRL) to optimize VNF placement. This study adopted a holistic approach to address the issue of data center server energy consumption and performance interference among VNFs. The objective is to minimize the overall server energy consumption while ensuring that the performance of each VNF exceeds a predetermined threshold. Basu et al. [9] proposed a machine learning-based methodology that integrates SDN and NFV to realize dynamic resource sharing in 5G-assisted unmanned aerial vehicle networks. The approach employed two regression models, Support Vector Regression and Kernel Ridge Regression, to predict VNF resource requirements and dynamically allocate VNFs based on the prediction results.
VNF sharing entails the optimal utilization of a singular VNF instance to handle multiple service requests that necessitate the same category of VNF. It is also applicable in cases where a specific VNF type needs to be deployed in multiple instances to meet the requirements of a particular service. Within VNF sharing, resources assigned to a VNF specific instance are concurrently utilized by multiple data packets, thereby diminishing packet waiting times in the queue. Li et al. [10] proposed a method tailored for deploying VNFs in data centers and introduced innovative techniques such as shared redundancy and multi-tenancy. This led to the development of a Joint Deployment and Backup Scheme (JDBS). The JDBS dynamically adjusted VNF deployment and backup strategies iteratively to effectively balance Basic Resource Consumption (BRC) and Shared Redundancy Consumption (DRC), ultimately achieving an optimal equilibrium between the two. Vieira et al. [11] considered the dynamic characteristics of edge environments, incorporating factors such as resource availability, uncertainty in user requests, QoS requirements, and user mobility. They employed a time window strategy to process batches of continuously arriving service requests. The algorithm also presented a two-tier resource-sharing mechanism, which facilitates the sharing of VNF instances or SFC instances among multiple services to reduce resource consumption and associated costs. Ruiz et al. [12] introduced a Genetic Algorithm-based approach to jointly addressed VNF placement, VNF chaining, and virtual topology design. The authors leveraged collaborative capabilities among Multi-access Edge Computing (MEC) nodes to enable VNF sharing. This approach utilized a novel search strategy during the chaining process, which prioritizes the identification of available VNFs in both local nodes and Central Offices. In the absence of such resources, the search extended to the physically nearest node within the topology until all network nodes have been explored. Yi et al. [13] proposed a dynamic and flexible algorithm to address VNF shared resource allocation and rate coordination between upstream and downstream VNFs. Specifically, the algorithm considered fairness factors during VNF sharing to reduce the probability of resource contention and enhance resource utilization. Additionally, by defining a backpressure indicator for each VNF to assess its pressure status, it dynamically adjusted the processing rate between the VNF and its upstream and downstream VNFs, with the aim of optimizing the utilization of idle resources.
The study by Kumar et al. [15] offered a comprehensive examination of security concerns and resolutions pertaining to VNF within the telecommunication domain. The paper systematically analyzed potential security threats and attacks targeting various components and layers within the NFV architecture. The proposed security measures for VNFs encompass aspects such as security hardening, role-based access control, software integrity, and protection against malicious code. Gui et al. [16] presented a distinct identity and access control scheme tailored for microservices in 5G platforms, which relys on OpenID Connect and JSON Web Tokens. This scheme facilitated the authentication and authorization processes for both users and microservices, thereby enhancing the overall lifecycle management of virtualized services. A notable feature of this study resided in its practical application and comprehensive evaluation carried out within the context of the SONATA service platform. Simultaneously, Smine et al. [17] proposed an innovative approach for the correct and optimal deployment of access control policies in NFV services. The approach considered a robust insider adversary model capable of compromising one or multiple VNFs within the Management and Orchestration (MANO) framework. Furthermore, Murillo et al. [18] introduced a specialized access control framework for virtualized Industrial Control Systems (ICS). The framework incorporated an advanced policy language to clearly define the components, roles, and authorized operations within the ICS. Additionally, the system included a policy engine that facilitated the translation of high-level policies into low-level rules, enabling their execution across various virtualization platforms. The primary objective of this framework was to furnish ICS administrators with a user-friendly tool for flexibly defining and managing access control policies in virtualized ICS.
In light of the preceding analysis, contemporary research initiatives in the field of VNF resource sharing primarily focused on traffic attributes and the succession of service supply chains. Unfortunately, these efforts often neglect the crucial issue of guaranteeing a fair and just allocation of benefits among the diverse entities engaged in resource sharing. Regarding resource access control, the pertinent literature predominantly centered on enhancing extant models based on third-party authentication.
Moreover, there has been some related works on the application of blockchain in the placement and resource allocation of VNFs. Liu et al. [25] presented a blockchain-based approach that incorporates vector commitments and Succinct Non-Interactive Knowledge Proof (SNARK) techniques for VNF management. Their proposed method efficiently managed VNF dictionaries and validates queries. Taskou et al. [26] proposed a blockchain-based strategy for NFV resource allocation. Through the use of smart contracts, their approach achieved decentralized, secure, and reliable resource allocation. The paper defined two optimization problems: the NFV resource allocation problem, which aims to minimize energy consumption and resource costs for data centers, and the mining task offloading problem, which seeks to minimize energy consumption for mining users. Papadakis et al. [27] introduced a blockchain-based network service marketplace and resource orchestration mechanism to enable cross-service communication within the edge cloud. Leveraging the smart contract functionality of the Hyperledger Fabric platform, the paper automated network service interactions and lifecycle management among different tenants. Additionally, it introduced an innovative service orchestrator that utilizes the capabilities of Open Source MANO (OSM), establishing cross-service communication with minimal resource requirements and instantiation costs. Regarding the allocation and competition strategies for VNF resources, Franco et al. [28] utilized blockchain and smart contract technologies to propose a reverse auction-based solution for discovering and selecting infrastructure capable of efficiently hosting VNFs. This solution encouraged competition among Infrastructure Providers, thereby mitigating the deployment costs for VNFs while simultaneously addressing the unique needs of users. Notably, the solution leveraged the tamper-proof and auditable features of blockchain, which ensures reliable records and contract execution. An advantageous aspect of this solution was its consideration of various user and VNF requirements, such as minimum resources, geographical location, and maximum latency, rather than relying solely on pricing for infrastructure selection.
Moreover, existing literature has delved into the utilization of game theory to delineate VNF chains and formulate strategies for the allocation of VNF resources. Leivadeas et al. [30] presented an approach grounded in graph partitioning game theory to address the placement problem of VNF service chains. The method effectively implemented service chains in cloud environments. The achievement was made possible by effectively addressing server affinity, coexistence, and latency constraints. Simultaneously, the method aimed to minimize deployment costs while also achieving resource load balancing. Chen et al. [31] introduced an incentive-driven framework for VNF chains, aiming to optimize resource allocation across different layers, such as bandwidth and IT resources. This framework was specifically designed for Interconnected Data Center Elastic Optical Networks (IDC-EONs) and involved coordination among multiple agents. The framework employed a non-cooperative hierarchical game theory mechanism, where resource agents assume the role of leaders and VNF-SC users act as followers. Within the leader game, agents calculated VNF-SC service solutions for users and calculated them for configuration tasks. In the follower game, users competed for cross-layer resources based on the service solutions provided by agents, aiming to achieve a joint optimization of resource cost and service quality. Gao et al. (2022) [32] introduced a VNF placement by potential games. The objective of the method was to enhance resource allocation and improve service quality in the context of satellite edge computing. The approach modeled the VNF placement problem as a non-cooperative potential game and utilized the Nash equilibrium as the solution concept. Le et al. [33] employed a game-theoretic approach, coupled with the semi-tensor product matrix tool, to investigate the SFC routing problem. The consideration encompassed both limitations in server capacity and constraints on the minimum target rate for users. This method effectively ensured NFV server capacity constraints while meeting user rate requirements. Li et al. [34] utilized a game-theoretic approach to address the problem of embedding multiple SFCs. The methodology considered both the impact of resource sharing among different VNFs and the limitations in capacity of various NFV nodes. The objective of this approach was to minimize the end-to-end (E2E) latency for the traffic supported by each SFC while satisfying the capacity constraints of all NFV nodes. Regarding the resource allocation mechanism for VNFs, Lima et al. [35] proposed a approach to address the resource management and orchestration problem in NFV. The mechanism utilized a bilateral sealed-bid auction model, which treats users and infrastructure providers as buyers and sellers, respectively. It employed a centralized agent to match demands and bids, resulting in the optimization of the social welfare for both buyers and sellers.
Inspired by the mentioned research work, we present utility functions grounded in economic principles to systematically elucidate the intricate dynamics between infrastructure providers and participants in VNF resources. This undertaking requires the development of a cohesive game model for VNF resource sharing. Notably, our approach to access control for shared resources diverges significantly from conventional practices, as we strategically integrate blockchain technology. Although the attribute-based encryption method is utilized, the need for third-party authentication authorities is eliminated. This measure enhances the level of security and ensures the privacy protection when accessing VNF resources.

3. System Framework

The proposed system, as illustrated in Figure 2, consists of five fundamental components: (i) Instantiation VNF, (ii) Infrastructure Provider, (iii) Resource Owner, (iv) Blockchain and (v) Controller.
Instantiation VNF (IV):
  • The instantiation process initiates with a VNF entity requesting essential resources from the Infrastructure Provider to fulfill specific operational needs.
  • Upon successful acquisition of the necessary resources, the entity is furnished with access policies meticulously tailored to its attribute set.
  • These access policies play a crucial role in ensuring the enforcement of appropriate access controls within their designated time frames.
Infrastructure Provider (IP):
  • Traditionally, in the context of NFV, IP has been recognized as a fundamental retailer, serving as the primary resource provider for a range of VNFs.
  • IP leases resources to different VNFs based on temporal agreements.
  • IP utilizes a range of strategies to effectively manage access control and bolster security measures.
  • In this study, the role of IP is translated into a resource integrator. This is achieved by collecting resource utilization and preferences data from previously deployed VNFs. In this context, IP provides a hybrid resource provisioning mechanism for newly requested instantiated VNFs. This approach aims to optimize the overall system’s resource utilization and facilitate flexible resource allocation.
Resource Owner (RO):
  • RO represents a currently operational VNF that is equipped with surplus resources and has a willingness to share these resources within defined temporal constraints.
  • This sharing initiative is designed with the objective of generating supplementary revenue and mitigating capital expenditures.
Blockchain:
  • Blockchain plays a pivotal role in the storage of cryptographic keys and the management of access control within the system.
  • All entities utilize the blockchain to create and deploy smart contracts.
  • These smart contracts facilitate the key distribution and access control for shared resources.
Controller:
  • The controller, which is implemented through smart contracts, assumes the responsibility of monitoring and managing resources throughout the entirety of the network infrastructure.
  • The RO periodically transmits pertinent information to the controller, thereby facilitating the efficient monitoring of the overall status of network resources.
Figure 2 illustrates the process of information exchange among the instantiation VNF, Infrastructure Provider (IP), and Resource Owner (RO) through the utilization of a blockchain-based platform that incorporates three contracts.
Initially, it is required for the RO, IP, and IV to complete the registration of external accounts and implement smart contracts on the blockchain. Following a successful registration process, the blockchain system allocates a unique anonymous identity (ID) and generates associated certificates (Cert), public keys (PK), private keys (SK), and wallet addresses (WA) to each node. These certificates play a fundamental role in user identity verification, and the mapping list (ID, Cert, PK, and WA) is securely stored within the account pool. Moreover, these data are meticulously cataloged in a comprehensive global information repository, which is under vigilant maintenance and monitoring by the control node.
Subsequently, the controller conducts periodic data collection on idle resources and sharing preferences from ROs, and stores these data in a dedicated database. Upon instantiating a new VNF, the IP utilizes real-time data from the database. This involves employing both the utility game model and the greedy matching algorithm. The goal is to efficiently match and select the most advantageous resource-sharing scheme in collaboration with the RO. The chosen scheme is then conveyed to the smart contract.
Finally, the secure allocation of shared resources is achieved through a blockchain-based encrypted access control approach. This process primarily involves key generation, resource address encryption, access policy concealment, and resource address decryption.
In the phase of key generation, the secret key (SK) is generated through the utilization of the key generation algorithm. This algorithm requires the public key, master key, and the attribute set that is linked to the resource demand collection as its input.
Moving to the resource address encryption phase, the RO initially assigns unique IDs to each shared resource. By employing a hash function, the corresponding indices (index) are derived and subsequently stored on the blockchain via a smart contract. The contract address (addr) is then communicated to the IP. Following this process, the RO independently encrypts the resource addresses and access policies, resulting in the creation of two distinct ciphertexts: encrypted address (ADC) and access policy (ACC). The aforementioned ciphertexts are securely stored on the blockchain.
In the access policy concealment phase, a Bloom Filter is employed to obscure the access policies. This process yields the creation of an Adaptive Bloom Filter (ABF), which is then stored on the blockchain, while the previous policy function is eliminated.
During the decryption phase, the IV initiates the calculation of the index and ABF associated with the shared resource by using the addr obtained from the IP. Access legitimacy is verified through a smart contract by facilitating the reconstruction of the policy function. The process of reconstruction facilitates the retrieval of the ADC and ACC ciphertexts, ultimately leading to the execution of the decryption algorithm.

4. Resource Sharing Game Model

In the initial phase of VNF instantiation, the VNF sends a resource request to the IP, represented as the vector  R = { r 1 , r 2 , , r n } , where each element  r i  is a non-negative ( r i 0 ). The decision-making process pertaining to the allocation can be approached in two ways. The IP assesses whether to allocate dedicated resources exclusively for the VNF or to adopt a resource-sharing strategy with ROs. The determination of this decision depends on the current availability of free resources across servers and the potential profitability associated with resource sharing with ROs. Within this context, it is assumed that there are m ROs who have the capability to share a time slice in which resource i is available. For clarity and ease of reference, essential notations pertinent to this section are conveniently presented in Table 1.

4.1. Assumptions

Resource allocation for a given resource, denoted as i, encompasses two distinct modes: exclusive allocation or sharing with a maximum of one VNF without any further subdivision.
In contrast, various resources, labeled as i and j, exhibit the flexibility to be concurrently shared with a common VNF or independently allocated to distinct VNFs.

4.2. Infrastructure Provider Utility Model

Upon receiving the resource demand set R, if the IP decides not to implement a resource-sharing strategy and instead opts to allocate exclusive resources from the resource pool for the upcoming VNF deployment, and the cost associated with each resource i can be mathematically expressed as follows:
C P i = μ i r i
where  μ i  denotes the unit cost of resource i.
The aggregate cost of consumed resources is computed as
C P = i = 1 n μ i r i
In the scenario where the IP implements a sharing approach, whereby a portion of the resource requirements needed to instantiate a VNF is allocated to ROs based on their specific interests, the formulation of the utility function for deploying resource i to  R O j  can be expressed as follows:
U i j = ( 1 σ j ) υ i ln ( 1 + r i j )
r i F i j
0 < σ i < 1
υ i 1
r i j = r i R S j i 0 e l s e
Here,  σ j  represents the degree of relevance between the IV and  R O j . A higher value of  σ j  indicates a more robust alignment of business interests between the two VNFs, thereby increasing the likelihood of conflicts in network service timing and spatial usage. As a corollary, this leads to a diminished utility value. Therefore, it is imperative for the IP to make an effort in selecting the RO whose business profiles significantly vary from the instantiated VNF, thereby facilitating efficient resource sharing. The term  F i j  denotes the quantity of the available resource i within  R O j  during the specified time period. Meanwhile,  υ i  signifies the utility level of resource i. Importantly, the relationship between  υ i  and the remaining quantity of resource i in the IP’s current servers is negative. In other words, as the quantity of resource i diminishes in the servers, the IP’s incentive to engage in resource sharing with ROs increases, resulting in a higher sharing utility. Additionally,  R S j i  signifies the allocation of resource i through the sharing mechanism with  R O j .
To articulate the inverse relationship between the available resources and their influence on the IP utility function, we delineate the computation methodology for  υ i , as follows
υ i = r i I r i r i I , r i r i I r i r i r i I , r i > r i I
where  r i I  represents the remaining quantity of resource i in the IP.
The model ensures that the utility function of the IP is a non-negative, strictly concave, and twice continuously differentiable increasing function. Additionally, in cases where resource i is not participating in the sharing process, the utility value is assigned a value of zero.
In the scenario where the  R O j  sets the unit price for resource i as  ρ i j , and the IP sets the unit retail price for resource i as  κ i , the sum resulting profit for the IP is
P I = j = 1 m i = 1 n κ i r i + U i j ρ i j r i j μ i r i 0
r i 0 = r i N R S i 0 e l s e
where  N R S i  stands for resource i and is allocated by the exclusive resource.
The objective of the IP is to optimize profit, that is
max P I = j = 1 m i = 1 n κ i r i + ( 1 σ j ) υ i ln ( 1 + r i j ) ρ i j r i j μ i r i 0

4.3. Resource Owner Utility Model

Within NFV, ROs manifest their inclination to allocate presently dormant resources to other VNFs. This endeavor is pursued with the overarching objective of maximizing the revenue potential during periods when available resources would otherwise remain unutilized. However, it is crucial for ROs to judiciously contemplate the concomitant costs entailed in the allocation of their resources. The cost function pertaining to resource i within the purview of  R O j  is devised as
C i j = σ j λ i j r i j
where  λ i j  signifies the cost level of  R O j  for resource i. As mentioned earlier, the parameter = σ j  reflects the degree of correlation between the IV and the RO. For analogous reasons, a higher correlation enhances the likelihood of conflicts in the timing of network services and the utilization of space. Hence, the cost associated with shared services is positively proportional to the value of  σ j .
Therefore, it can be concluded that the profit of the  R O j  is
P R j = i = 1 n ρ i j r i j C i j
For the  R O j , the objective is also to maximize profit, that is
max P R j = i = 1 n ρ i j r i j σ j λ i j r i j

5. Greedy Matching Algorithm

Preliminary work: ROs engage in creating a smart contract by utilizing their existing resources and pricing strategy. This smart contract is subsequently deployed on the Ethereum, resulting in the acquisition of a unique contract address denoted as ‘addr’. Concurrently, each shared resource is assigned an ID by the RO, and its corresponding index is determined by applying a hash function. Following this, the ROs convey both the contract address ‘addr’ and the generated IDs to the IP. This enhances the ability of the IP to access up-to-date information regarding the availability of shared resources.
The proposed resource sharing model introduces a game-theoretic problem. From the perspective of ROs, the strategy to maximize profits entails setting higher prices for unit resources. However, if the unit resource price is set too high, it may have the unintended consequence of reducing the revenue of the IP and potentially discouraging the IP from selecting the RO as a partner for resource sharing. Notably, the utility function of the IP and the cost function of the RO are both influenced by the correlation parameter  σ j . As demonstrated in Equations (11) and (14), a decrease in the value of  σ j  enhances the probability of both parties attaining optimal earnings simultaneously. Consequently, ROs with a lower correlation to the IV in the current system may intentionally set a higher unit resource price, for engaging in a strategic competition among multiple ROs.
From an alternative perspective, the IP is assigned the responsibility of disseminating the resource requirements of the IV among separate ROs for either resource sharing or the allocation of exclusive resources. Consequently, the issue of resource sharing encompasses a scenario where ROs and the resource demand vector R need to be matched.
Suppose resource i is deployed into the shared resources of  R O j ; at this point, the revenue for the IP with respect to resource i is denoted as
P I i = κ i r i + ( 1 σ j ) υ i ln ( 1 + r i j ) ρ i j r i j
From the plots of this function in Figure 3, it can be observed that there exists a peak revenue point. Additionally, for a given resource i, the implementation of different pricing strategies by the RO can result in distinct peak revenue points and corresponding resource quantities. These variations are influenced by factors such as the correlation and utility level, which are predetermined parameters. Furthermore, specific resource quantity requirements are essential to ensure a positive revenue. Through an analysis of this function, it can be deduced that the optimal resource quantity that maximizes revenue is denoted as
r i m a x = υ i ( 1 σ j ) ρ i j 1
and the maximum benefit is
P I i m a x = ρ i j + υ i ( σ j + ln ( υ i ( 1 σ j ) ρ i j ) ( 1 σ j ) 1 ) + κ i r i
In the context of VNF instantiation, where the quantity of resource requests  r 1 j  remains constant, the IP must make judicious decisions among various ROs to optimize outcomes, aiming to closely approximate the extremum of the revenue. From the RO’s perspective, the ongoing game constitutes an information-symmetric scenario due to the storage of information in the blockchain. The RO possesses comprehensive knowledge of all resource demand situations. Consequently, in the pursuit of maximizing their earnings, each RO will strategically adjust the unit price of resources to align with the objective of maximizing profit for the target resource, while also attracting the attention of the infrastructure provider.
The matching process for each shared resource  r i  consists of two distinct stages: the price competition stage among ROs and the IP decision stage.
During the stage of price competition among ROs, a game of pricing strategy unfolds. Each RO determines the price  ρ i j  for each resource based on their utility parameter  σ j  and the pricing strategies employed by other ROs. The main goal is to attract the interest of the IP and optimize financial gains. It is assumed that each RO acts rationally and possesses access to the utility function parameters of other ROs through information conveyed in smart contracts. Consequently, this scenario establishes a game of perfect information price competition.
In the RO bidding stage, where all ROs participate as players, the strategy for  R O j  is to choose a price  ρ i j  from the feasible set  [ P l o w j , P h i g h j ] . Their objective is to select  ρ i j  that satisfies
arg max P i j = ρ i j r i j σ j λ j r i j
s.t.
ρ i j [ P l o w j , P h i g h j ]
0 P l o w j r i j P h i g h j
Here,  P l o w j  and  P h i g h j  denote the two points intersecting the x-axis in Figure 3. These points signify optimal choices for  ρ i j . Their selection ensures that the demand for resources falls within a range where the IP revenue remains positive.
In the IP decision stage, subsequent to obtaining a price list from all ROs for resource i, the IP needs to decide whether to allocate exclusive resources to the IV or opt for resource sharing with a specific RO. The objective is to select  N S i j  or  N R S  such that
arg max P I i = κ i r i + ( 1 σ j ) υ i ln ( 1 + r i j ) ρ i j r i j μ i r i 0
Through the above analysis of the game model, we devised a greedy matching algorithm in Algorithm 1.
Algorithm 1 Greedy Matching Algorithm
Input:
          Resource demand vector R;
          Unit cost of resource i for IP  μ i ;
          The degree of relevance between IV and ROs  σ j ( j = 1 , 2 , , m ) ;
          The cost level of Rs  λ j ( j = 1 , 2 , , m ) ;
Output:
          Resource Allocation plan for IV  r i j r i 0 ( j = 1 , 2 , , m ) ( i = 1 , 2 , , n ) ;
          The profit of IP  P I ;
          The profit of ROs  P R j ( j = 1 , 2 , , m ) ;
Begin
01:   Initialize
          The utility level of resource  υ i ;
          The free amount of resource i in  R O j F i j ;
          The unit retail price for resource i of IP  κ i ;
02:   FOR Resource i in demand vector R
03:         ROs engage in pricing strategy games according to Equations (18)–(20),
     resulting in price sequences  ρ  for resource i;
04:         Calculate IP’s profit  P I i  for each RO by Equation (21);
05:         Sort  P I i ;
06:         IP selects the largest  P I i  for a decision or allocates exclusive resources for IV
07:         Update  F i j , the free amount of resource i in  R O j
08:   ENDFOR
End

6. Blockchain-Based Encrypted Access Control Approach

Upon achieving a match in resource sharing, ROs and IVs participate in encrypted resource allocation and access control, which is facilitated through blockchain coordination.

6.1. Bilinear Mapping

In the context of cryptographic operations, a pairing, denoted as  e : G 0 × G 0 G 1 , is a fundamental bilinear mapping. In this representation,  G 0  and  G 1  refer to cyclic groups of prime order p, with g serving as a generator for  G 0 .
The pairing operation e is characterized by key properties:
  • **Bilinearity**: For any  P ,   Q G 0  and non-zero  a ,   b Z p , it holds that  e ( P a ,   Q b ) = e ( P   , Q ) a b .
  • **Non-degeneracy**: The property of non-degeneracy ensures that  e ( g ,   g ) 1 , particularly when g operates as a generator of  G 0 .
  • **Computability**: There exists an algorithm available that efficiently computes this mapping within a polynomial time complexity.

6.2. Linear Secret Sharing Scheme (LSSS)

In the context of LSSS [37], let U denote the attribute domain, and p stand as a prime number. For every access structure M defined on U, M is essentially an r by n matrix over the field  Z p . The rows of this matrix M are associated with mappings to  ρ ( 1 , 2 , , i ) . Here, a secret value s ( s Z p ) and a set of random numbers  l 1 , l 2 , , l n Z p  collectively compose the vector  v = ( s , l 2 , l 3 , , l n ) , and its transpose is represented as  v = v T . Consequently, the product  M v  yields r secret shares denoted as  ω i = ( M v ) i , each corresponding to the secret share held by  ρ ( i ) .
In terms of Linear Reconstruction, the focus is on an authorized attribute set S, where  I = { i : ρ ( i ) S } { 1 , 2 , , r } . In this context, elements  c i , c j A  are introduced, with the stipulation that for any  B , C A  where  B C , it holds true that  C A . This particular characteristic defines A as a monotonic access structure. For the purposes of this paper, we specifically emphasize monotonic access structures. In the realm of Attribute-Based Encryption (ABE), the traditional roles of entities are replaced by attributes, thus integrating authorized attribute sets within the broader access structure A.

6.3. Algorithm Steps

Step 1 Initialization:
Given a security parameter  λ , the initialization algorithm chooses two cyclic groups  G 0  and  G 1  of prime order p, Additionally, it designates a generator g for  G 0  and defines a bilinear mapping e with the functionality  e : G 0 × G 0 G 1 . The process of selecting and mapping groups is accomplished by utilizing the group generator algorithm. Furthermore, random elements  h , k , q G 0  and  α , β Z p  are generated. The public key  P K  is then computed as
P K = { G 0 , p , g α , g β , h , k , e ( g , g ) α }
and the master key as  M S K = { α , s , t } .
The process is initiated by the RO through the creation and deployment of a smart contract on the blockchain. This results in the acquisition of a designated contract address, which is denoted as  a d d r . Subsequent to this step, the RO allocates a distinctive identifier, denoted as  I D , and designed for the upcoming configurations of shared resources. Following the identifier assignment, the Hash method is employed to calculate an index, and both the contract address ( a d d r ) and the identifier ( I D ) are securely stored within the domain of the IP. Lastly, the computed index is transmitted to the blockchain through the smart contract.
Step 2 Encryption:
The attribute set of the resource i to be shared by RO is recorded as  R s = a t t 1 , a t t 2 , a t t n . By selecting u randomly from the set of  u 1 , u 2 , , u m Z p , the following elements are computed:
D = g β q u
H = g u
X j , 1 = ( h a t t j g β ) u i k u
X j , 2 = g u j
These calculations result in the generation of a private key as
S K = { S , D , H , X j 1 , X j 2 }
Subsequently, the system selects w randomly from  Z p  and computes  k e y = e ( g , g ) α w  by utilizing the  P K  and the  I D  of the resource. For each attribute in  Z p , denoted as  a t t i  and letting  θ i  be a share of w, we can compute
Y i , 1 = q k θ i
Y i , 2 = ( h a t t i g β ) θ i
Y i , 3 = g α θ i
These elements, in combination with the selected parameters, give rise to a partial ciphertext represented as:
C T p r e = { k e y , g w , w , a t t i , s i , Y i , 1 , Y i , 2 , Y i , 3 }
The RO then employs an attribute-based encryption algorithm to encrypt the resource key  R K . By utilizing the public key  P K , the resource key  R K , the LSSS-based access structure  ( M , ρ ) , and the  C T p r e , the ciphertext  C T  is generated. In the access structure  ( M , ρ ) , M is an  r × n  matrix, and the computation of  Y i , 4  is carried out as
C T = ( ( M , ρ ) , g w , Y , Y i , 1 , Y i , 2 , Y i , 3 , Y i , 4 )
Then, the RO maps the  C T  to the  i n d e x  and uploads this mapping to the blockchain. The RO utilizes a smart contract to define the validity access time for the  C T .
Within the framework of this LSSS-based CP-ABE scheme, an attribute Bloom filter (ABF) is established through the following series of steps:
(1)
The RO extracts the attribute set  R S  from the access policy defined in the access structure  ( M , ρ ) . An element in the ABF, denoted as e, is structured as  e = ( r | | a t t i ) , where r signifies the row number of the matrix M, and  a t t i  represents one of the attributes. These components are transformed into bit strings of lengths  L r o w n u m  and  L a t t , respectively.
(2)
The  L r o w n u m  bit string and  L a t t  bit string are combined into a  λ -bit string. An element  s = ( i | | a t t s )  is introduced to the ABF, where s constitutes a secret share value. To achieve this,  n 1 λ  bit strings  l 1 , l 2 , , l n 1  are randomly obtained, and  l n = l 1 l 2 l n 1 s  is computed through secret sharing.
(3)
Hash functions are applied to  a t t s  of element s in order to derive  i n d e x  positions for each share value within the ABF as  h 1 ( a t t s ) , h 2 ( a t t s ) , , h n ( a t t s ) .
(4)
The RO proceeds to store each shared value at the corresponding hash index location. Subsequently, the RO uploads both the ABF and the access matrix M to the IP.
Step 3 Decryption:
The IV initiates the process by obtaining the Resource Identifier  I D , the address of the smart contract, and the encrypted data stored by the RO on the IP. The IV then proceeds with the following steps:
1.
ID Verification and Resource Existence Check: The IV hashes the received  I D  and executes the smart contract to validate the existence of the requested resource on the blockchain. If the resource cannot be located, the algorithm terminates.
2.
Ciphertext Access Time Check: Upon obtaining the ciphertext’s  I D  through Algorithm 2, the IV first checks whether it falls within the valid access time period. If access is not granted, termination occurs. Otherwise, the user proceeds to acquire the ciphertext  C T  of the Resource Key  R K .
3.
Attribute-Based Policy Verification: Before decrypting the ciphertext, the IV must ensure that its attributes satisfy the access policy. This involves restoring the policy function  ρ .
4.
The reconstruction of the policy function  ρ  from the Attribute Bloom Filter (ABF) is performed through the following steps:
(1)
Utilize n hash functions to hash the attributes
h 1 ( a t t s ) , h 2 ( a t t s ) , , h n ( a t t s )
(2)
Obtain the corresponding strings through position indexes;
(3)
Calculate the shared value s and output the corresponding string:
s = l 1 l 2 l n
(4)
Represent s as  s = ( r | | a t t ) , and compare  a t t  with  a t t s . A match signifies the presence of the attribute in the ABF, while  a t t  denotes the attribute’s position within the access matrix M. A mismatch indicates that the attribute is absent in the ABF.
(5)
Upon the successful restoration of the access structure  ( M , ρ ) , the IV proceeds with the decryption process.
5.
Resource Key Retrieval: With the reconstructed access structure  ( M , ρ ) , the IV is able to decrypt the ciphertext  C T  to obtain the Resource Key ( R K ). The computation involves verifying that the IV’s attributes align with the access policy and calculating  R K  based on authorized attribute sets and shared values.
Algorithm 2 IV Gets CT
Input: Resource  I D
Output: Cipher text  C T
Begin
01:    i n d e x  = hash( I D );
02:   IF  i n d e x  = null
03:         Return error;
04:   ELSE
05:         Mapping( i n d e x ⇒ CT.available_time)
06:         IF Runing time is expired
07:                Return error;
08:         ELSE
09:                Mapping( i n d e x ⇒ RO.available_time)
11:         IF Sharing time is expired
12:                Return error;
13:         ELSE
14:                Mapping( i n d e x C T )
15:   ENDIF
End

7. Simulation Results

In this section, we conduct extensive simulation experiments to evaluate the performance of the proposed mechanism.

7.1. Simulation Setup

In this section, we delineate the simulation setup employed for the assessment of the proposed system, which relies on the Open Network Automation Platform (ONAP) [38]. Additionally, we elucidate the blockchain module crafted utilizing the Ethereum platform [39] and implemented through the Solidity smart contract language [40].
1.
Experimental Environment
The simulation experiments were carried out in a controlled environment, utilizing specific software and hardware configurations.
Software:
  • ONAP Run-time: We employed the Run-time module of the ONAP framework to facilitate VNF instantiation. The Run-time model offers the essential interfaces and standards for VNF management. In our study, we specifically modify the code of the Virtual Function Controller (VF-C) in order to implement our framework. The structure of the Run-time is depicted in Figure 4.
  • Ethereum Platform: We deployed the blockchain module on the Ethereum platform, which served as the underlying infrastructure for executing the smart contracts.
  • Solidity: We used Solidity, a high-level language for coding smart contracts, to develop the necessary smart contracts for implementing the blockchain module.
Hardware:
  • Processor: Intel Xeon(R) Gold 6238R (DELL PowerEdge R740, made in Shenzhen, China);
  • Memory: 200 GB RAM;
  • Storage: 1 TB HDD.
2.
Simulation Scenarios
We conducted a series of simulation scenarios. The key parameters and variables considered in our simulations are as follows:
We varied the number of ROs and the length of the resource requirement vector (R). Scenarios were explored across RO counts from 1 to 50, and resource requirement vector lengths ranging from 1 to 10. The quantity of resource i required by the IV, denoted as  r i , underwent investigation across a range of values from 1 to 50. We evaluated the degree of relevance ( σ j ) between the IV and each  R O j , as well as the cost level of  R O j  for resource i ( λ i j ). Both  σ j  and  λ i j  were assumed to follow a uniform distribution, with values ranging from 0.1 to 0.9, respectively. Additionally, the unit cost of resource i for the IP ( μ i ) was randomly set between 100 and 300, while the unit retail price for resource i of IP ( κ i ) was randomly set to be 25% to 35% higher than  μ i . For convenience, a summary of the parameters and their respective value ranges is presented in Table 2.
3.
Evaluation Metrics
To assess the effectiveness and efficiency of our proposed system, we employed the following evaluation metrics:
Social utility: The social utility, denoted as S, is a measure used to assess the efficiency of resource allocation by considering the combined revenue generated by both the RO and the IP. The computation of this social utility involves assessing the disparity between the utility of resource sharing provided by the IP and the cost of resource contribution borne by the RO. Mathematically, it is expressed as
S = U i j c j i = ( 1 σ j ) υ i ln ( 1 + r i j ) σ j λ j r i j
Running time of matching algorithm: To gauge the algorithm’s performance, we conducted extensive runtime tests under different scenarios. These tests provided insights into the algorithm’s computational efficiency, and comparative analyses were conducted with the results obtained from alternative algorithms.
Performance of access control: We conducted tests primarily aimed at comparing the efficiency of the proposed algorithm in terms of encryption and decryption with that of other algorithms in the same category.

7.2. Performance of Greddy Matching Algorithm

7.2.1. Validity Test of the Algorithm

Figure 5 illustrates the pricing dynamics of RO for shared resources concerning the variations in the cost level of  R O j  for resource i under different utility levels of  υ i .
It becomes apparent that a relatively high value of  υ i , which indicates resource scarcity within the IP, results in an increased tendency towards resource sharing. Consequently, this tendency enables ROs to set higher prices for their shared resources, ultimately enhancing their profitability.
Furthermore, within the proposed framework, the pricing strategy employed by ROs for shared resources is positively correlated with the growth of  λ i j . In instances where the cost level of  R O j  for resource i is low, ROs opt to set lower prices in order to attract a greater demand. Conversely, when faced with higher values of  λ i j , ROs find themselves dealing with more substantial costs related to resource sharing, compelling them to institute higher prices for their shared resources.
This strategic pricing mechanism efficiently captures the dynamic characteristics of the resource-sharing ecosystem. The experimental results underscore the validity of the proposed mechanism and algorithm, which foster a healthy competitive environment among ROs and enable efficient negotiation between ROs and the IP.

7.2.2. Algorithm Performance Comparison

The resource sharing model introduced in this research can be viewed as a specialized variant of the Stackelberg game model.
The Stackelberg game is a strategic interaction model within game theory that involves players with asymmetric positions. In this model, one player assumes the role of the leader, while the others become followers [41]. The leader takes the initiative in decision making, and the followers carefully observe these decisions before formulating their own choices. This distinctive feature of sequential decision making differentiates the Stackelberg game from simultaneous-move games.
Typically, the leader’s objective is to maximize its own utility or payoff, while considering the anticipated reactions of the followers. Concurrently, the followers strive to optimize their outcomes based on the leader’s decisions. The advantage of a leader resides in its capacity to exert influence over the ultimate outcome by strategically shaping choices that consider the reactions of the followers.
Stackelberg games are solved using diverse methods based on game characteristics and players’ information. Common approaches include Mathematical Programming (linear or nonlinear optimization), Nash Equilibrium Analysis, Dynamic Programming for sequential decisions, Simulation and Computational Methods, Game Tree Analysis for visualizing decisions, Optimal Control Theory for dynamic games, and considering Learning and Adaptive Strategies for realistic behaviors.
Particularly, the diagonalization method serves as a valuable tool for resolving Stackelberg games by transforming the initial non-diagonal structure of the game into a diagonal format. This transformation facilitates independent decision-making for both the leader and the follower, simplifying the analytical process. The diagonalization method is notably efficient in computing the Nash equilibrium and determining strategies for both players in a Stackelberg game.
To evaluate the performance and efficacy of the proposed greedy-based matching algorithm, a comparative analysis was carried out in comparison to the diagonalization method. This comparison aimed to assess the optimization capabilities of the two algorithms in terms of achieving optimal social utility and algorithm performance.
For the sake of brevity, the algorithm introduced in this paper is referred as GA, while the diagonalization method is denoted as DA.
Figure 6 delineates the dynamics of social utility (S) in the context of both GA and DA. The examination investigates the impact of varying the length of the resource requirement vector (R), while keeping a constant number of 35 ROs.
The observations consistently underscore a discernible pattern: in both algorithms, an augmentation in the diversity of resource demands, as indicated by the length of R, corresponds to an increase in social utility. This increasing trend is propelled by a heightened interest in resource sharing among ROs, particularly when the available resources of IPs face constraints due to the proliferation of resource types ( υ i  becoming larger). ROs are more incentivized to contribute their dormant resources.
As the demand for resources increases, the rate of growth in social utility gradually decelerates. When the length of the resource demand vector R exceeds 9, the rate of change in social utility approaches zero. This is because the variety of resource demands increases to a significant extent, resulting in a scarcity of idle resources for ROs. Consequently, a saturation point is reached where the rate of social utility growth decelerates.
Furthermore, the results indicate that the proposed algorithm GA has slightly lower results than the diagonalization method DA in terms of social utility. The minimum difference occurs when the length of the resource demand vector is R 1, with a difference of 0.11. The maximum difference occurs when the length of the resource demand vector R is 5, with a difference of 17.14. This difference arises from the precision of DA, which has the capability to achieve optimal objectives. In contrast, GA relies on a greedy strategy, which offers a heuristic approach that does not fully consider the overall global social utility.
The experiments illustrated in Figure 7 are conducted with a constant resource requirement vector length R of 5. The objective is to examine how social utility S changes as the quantity of ROs varies.
In both algorithms being analyzed, it is evident that there is a positive correlation between the number of ROs and the increase in social utility. However, the trend diverges from Figure 6. Here, the rate of social utility growth intensifies with a larger RO pool. When the number of ROs increases from 5 to 10, the growth rates of the social utility of GA and DA are 0.55 and 0.802, respectively. Nevertheless, as the number of ROs increases from 45 to 50, the growth rates of social utility for GA and DA are 9.332 and 9.928, respectively. This phenomenon can be attributed to the escalating deployment of VNFs in conjunction with a rising number of ROs. Moreover, this trend indicates a reduction in the availability of exclusive resources for IP, resulting in increased values of  υ i . Subsequently, the increased scarcity of limited resources necessitates that IP prioritize the allocation of shared resources for newly requested instances of VNFs. As a result, there is a noticeable intensification in the rate of the growth of social utility.
Consistent with previous observations, GA lags marginally behind DA concerning social utility. This outcome can be attributed to the characteristics of GA, for the same reasons as previously mentioned.
Another performance evaluation of the proposed algorithms focuses on runtime, specifically in relation to the length of the Resource Requirement Vector R and the number of ROs. This analysis is aimed at uncovering how these variables impact the efficiency of the algorithms.
The results, presented in Figure 8 and Figure 9, show that GA displays a remarkable stability in its runtime, with minimal sensitivity to variations in both R and the number of ROs. This suggests that GA consistently maintained high efficiency under diverse scenarios.
In contrast, the runtime of DA significantly increases as both the length of the resource requirement vector and the number of ROs increase. The longest runtime for DA is 8.1 times that of GA. This behavior is attributed to the DA’s iterative solving approach, which does not guarantee a predictable convergence speed. When confronted with a larger number of participants, such as multiple leaders or followers in the game model, the solving process of DA becomes less efficient, leading to a longer runtime.
Furthermore, it can be observed that the runtime of DA follows a similar trend to the growth rate of social utility. This occurs because the increase in social utility is driven by high-quality resource sharing, which necessitates more iterations in DA’s solving process. As a result, there is a similar upward trend in runtime as social utility increases.
The conducted experiments reveal that our proposed greedy matching strategy, although falling short of attaining the optimal social utility inherent in the standard Stackelberg game solution, demonstrates significant efficiency that remains largely unaffected by variations in the problem scale. Moreover, the outcomes produced by our algorithm exhibit only marginal deviation from the optimal solution. This characteristic renders our approach well-rounded and efficient.

7.3. Performance of Blockchain-Based Encrypted Access Control Approach

7.3.1. Security Analysis

In the presented solution, the achievement of precision in the access control is accomplished by employing smart contracts and applying attribute-based access control policies. Initially, RO exercises comprehensive authority over its extant resources. The pertinent resource details, encompassing addresses, attributes, and access permissions, undergo encryption via specified algorithms. Notably, the aforementioned process is devoid of any involvement from third-party entities in data acquisition and resource allocation. Furthermore, the incorporation of blockchain technology facilitates distributed access control. Blockchain serves as a communication medium among the three entities, which encompass the storage of all resource records and transactional information. The inherent features of blockchain technology ensure the simultaneous achievement of traceability and immutability in resource utilization.
Anonymity
In this scheme, the IV is ascertained through attributes rather than the user’s actual identity, thus providing the system with a level of anonymity. Each allocation of resource sharing involves the assignment of a set of attributes and their corresponding private keys to individual IVs. When instantiated VNFs seek access to resources, the system validates the user’s attribute set and private key. Access is granted only when all conditions are satisfied, thereby ensuring the preservation of VNFs’ genuine identity privacy while facilitating robust control over resource access.
Conversely, in conventional ABE schemes, the access policy is directly appended to the ciphertext in plaintext. This practice compromises the confidentiality of relevant technical details by making access policies susceptible to exposure. In this research, an enhanced Bloom filter is employed to obfuscate the correlation between attributes and access structures. Upon the initiation of resource sharing, the system computes the attribute set of the IV. If the attribute set aligns, the policy  r h o  can be reconstructed; otherwise, an error message is generated. This approach effectively conceals the access policy associated with each shared resource.
On-repudiation attack:
In the aforementioned scheme, whenever there is a need for resource sharing allocation, a smart contract is invoked to verify permissions. Subsequently, a reliable and unchangeable access log is recorded on the blockchain. Any unauthorized access conducted by malicious IVs will be meticulously recorded on the blockchain, thereby rendering non-repudiation unattainable.
Man-in-the-middle attack:
A potential vulnerability arises in the context of man-in-the-middle attacks, wherein a malevolent entity illicitly interferes with the communication exchange among the RO, IP, and IV. In the proposed scheme, the algorithm integrates attribute permission authentication for the authorization requests initiated by the IV. This mechanism serves as an supplementary safeguard, even in scenarios where a malicious IV initiates an authorization request.
The safeguarding process entails the verification of attributes presented in a request by the smart contract to ensure their alignment with the access policy defined by the RO. Furthermore, the request necessitates the inclusion of a unique IV identifier, which is securely documented on the blockchain ledger before transmission. Through the verification procedures embedded in the smart contract, any tampered or falsified requests can be readily detected, thereby enhancing the security against potential man-in-the-middle attacks.

7.3.2. Algorithm Performance Comparison

In order to assess the effectiveness of the proposed CP-ABE access control method, a comparative analysis of the efficiency of encryption and decryption processes was conducted. The traditional CP-ABE [42] and the improved Multiauthority CP-ABE [43] were used as benchmarks for comparison. The authors of [43] propose a methodology aimed at realizing nuanced access control within Internet of Things (IoT) healthcare systems. The aforementioned objective is accomplished by employing Elliptic Curve Cryptography (ECC) and CP-ABE. The employed strategy entails integrating multiple Attribute Authorities (AAs) to distribute user keys, effectively addressing the key escrow predicament typically associated with a single authority. In addition, the chosen methodology opts for ECC instead of bilinear pairing operations, leading to reduced computational and communication expenses. Furthermore, the introduction of User Assistant Entities (DUA) is pivotal, as they facilitate the outsourcing of specific components of the decryption process. This innovation effectively alleviates the decryption burden on users.
For convenience, the method proposed in this paper is abbreviated as BE, the traditional CP-ABE algorithm is referred to as TE, and the Multiauthority CP-ABE method is denoted as ME. We evaluate the efficiency of the encryption and decryption processes under various resource attribute quantities.
In Figure 10, it is apparent that the proposed solution demonstrates a gradual growth in encryption time with the augmentation of resource attributes. In contrast, the other two algorithms exhibit varying degrees of increased encryption times, with the TE method consuming the highest amount of time.
The occurrence of this phenomenon can be attributed to the inclusion of extensive precomputation procedures within the BE. The strategic implementation of precomputation enables the efficient generation of ciphertext upon obtaining resource information. As a result, the proliferation of attributes has a minimal impact on the efficiency of encryption for BE.
Conversely, ME leverages more efficient ECC algorithms in lieu of bilinear pairing operations. Consequently, this method exhibits superior encryption efficiency compared to TE.
From Figure 11, it becomes evident that the decryption times for all three methods exhibit a substantial increase as the number of resource attributes increases. Among them, the ME method exhibits the shortest decryption time, followed by our proposed BE method, while the TE method experiences the longest decryption time.
This discrepancy is due to the utilization of a Bloom filter to conceal the resource access policies in this paper, which requires invoking the Bloom function to reconstruct IV’s access policies before decryption. This additional component increases the overall decryption time. Conversely, the remarkable efficiency of the ME method can be attributed to its utilization of DUA to facilitate partial decryption. The delegation of decryption responsibilities mitigates the decryption workload of the system, resulting in the highest level of decryption efficiency among the evaluated methods.
In summary, the method proposed in this paper enhances security within a blockchain-based framework while maintaining excellent encryption efficiency and moderate decryption efficiency.

8. Conclusions

This paper introduces a blockchain-based framework designed to facilitate efficient VNF resource sharing and implement secure access control. Our proposed approach aims to optimize the benefits for both infrastructure providers and VNF instances. To achieve optimal resource utilization, we present a resource sharing game model and a corresponding matching algorithm. Moreover, our innovative access control mechanism ensures secure key storage and enables fine-grained access control. Simulation results confirm the efficiency and superiority of our proposed solutions.
Nevertheless, an aspect that has not been addressed in this study pertains to the predictability of network traffic. The integration of sophisticated machine learning algorithms in the prediction of network traffic has the potential to offer resource owners a more comprehensive understanding, thereby facilitating the formulation of enhanced pricing strategies. Therefore, future work could prioritize the incorporation of machine learning techniques in the realm of business and traffic prediction, which offers a supplementary data support for the resource sharing game model. Furthermore, this paper exclusively employs a negative correlation as a parameter in the utility function to model relationships among VNFs. To enhance utility functions and improve resource sharing strategies, future work will explore the integration of traffic sequencing among multiple VNFs and investigate the potential correlation among various business entities.

Author Contributions

Conceptualization, A.D.; Methodology, A.D. and B.Y.; Software, A.D.; Validation, A.D.; Formal analysis, A.D.; Investigation, A.D.; Resources, X.W.; Data curation, A.D. and Q.H.; Writing—original draft, A.D.; Writing—review & editing, X.W., B.Y., Q.H. and Min Huang; Visualization, A.D.; Supervision, X.W.; Project administration, X.W.; Funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Key Research and Development Program of China under Grant No. 2022YFB4500800; the National Natural Science Foundation of China under Grant No. 62032013 and Grant No. 92267206.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Yi, B.; Wang, X.; Li, K.; Das, S.K.; Huang, M. A comprehensive survey of network function virtualization. Comput. Netw. 2018, 133, 212–262. [Google Scholar] [CrossRef]
  2. Kaur, K.; Mangat, V.; Kumar, K. A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture. Comput. Netw. 2022, 217, 109281. [Google Scholar] [CrossRef]
  3. Huang, W.; Zhu, H.; Qian, Z. AutoVNF: An Automatic Resource Sharing Schema for VNF Requests. J. Internet Serv. Inf. Secur. 2017, 7, 34–47. [Google Scholar]
  4. Cohen, R.; Lewin-Eytan, L.; Naor, J.S.; Raz, D. Near optimal placement of virtual network functions. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 1346–1354. [Google Scholar]
  5. Sun, J.; Liu, F.; Wang, H.; Ahmed, M.; Li, Y.; Liu, M. Efficient VNF placement for Poisson arrived traffic. IEEE Trans. Netw. Serv. Manag. 2021, 18, 4277–4293. [Google Scholar] [CrossRef]
  6. Savi, M.; Tornatore, M.; Verticale, G. Impact of processing-resource sharing on the placement of chained virtual network functions. IEEE Trans. Cloud Comput. 2019, 9, 1479–1492. [Google Scholar] [CrossRef]
  7. Sun, S.; Zhou, J.; Sun, Y.; Feng, G.; Qin, S.; She, W. Base Station Popularity-Based Dynamic Resource Allocation for VNF. In Proceedings of the 2019 2nd International Conference on Communication Engineering and Technology (ICCET), Nagoya, Japan, 12–15 April 2019; pp. 81–87. [Google Scholar]
  8. Mu, Y.; Wang, L.; Zhao, J. Energy-efficient and interference-aware vnf placement with deep reinforcement learning. In Proceedings of the 2021 IFIP Networking Conference (IFIP Networking), Espoo and Helsinki, Finland, 21–24 June 2021; pp. 1–9. [Google Scholar]
  9. Basu, D.; Kal, S.; Ghosh, U.; Datta, R. SoftDrone: Softwarized 5G assisted drone networks for dynamic resource sharing using machine learning techniques. Comput. Electr. Eng. 2022, 101, 107962. [Google Scholar] [CrossRef]
  10. Li, D.; Hong, P.; Xue, K.; Pei, J. Availability aware VNF deployment in datacenter through shared redundancy and multi-tenancy. IEEE Trans. Netw. Serv. Manag. 2019, 16, 1651–1664. [Google Scholar] [CrossRef]
  11. Vieira, J.L.; Battisti, A.L.; Macedo, E.L.; Pires, P.F.; Muchaluat-Saade, D.C.; Delicato, F.C.; Oliveira, A.C. Dynamic and Mobility-Aware VNF Placement in 5G-Edge Computing Environments. In Proceedings of the 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Madrid, Spain, 19–23 June 2023; pp. 53–61. [Google Scholar]
  12. Ruiz, L.; Barroso, R.J.D.; De Miguel, I.; Merayo, N.; Aguado, J.C.; De La Rosa, R.; Fernández, P.; Lorenzo, R.M.; Abril, E.J. Genetic algorithm for holistic VNF-mapping and virtual topology design. IEEE Access 2020, 8, 55893–55904. [Google Scholar] [CrossRef]
  13. Yi, B.; Wang, X.; Huang, M.; Das, S.K.; Li, K. Fairness-aware VNF sharing and rate coordination for high efficient service scheduling. IEEE Trans. Parallel Distrib. Syst. 2022, 33, 4597–4611. [Google Scholar] [CrossRef]
  14. ETSI GS NFV-SEC 003; Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance. ETSI: Sophia Antipolis, France, 2016.
  15. Kumar Bansal, M.; SV, A.; Krishnaswami, B. VNF Security in Telco Environment. In Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 275–285. [Google Scholar]
  16. Guija, D.; Siddiqui, M.S. Identity and access control for micro-services based 5G NFV platforms. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; pp. 1–10. [Google Scholar]
  17. Smine, M.; Espes, D.; Pahl, M.O. Optimal Access Control Deployment in Network Function Virtualization. In Proceedings of the NOMS 2022–2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022; pp. 1–9. [Google Scholar]
  18. Murillo, A.F.; Rueda, S. Access control policies for network function virtualization environments in industrial control systems. In Proceedings of the 2020 4th Conference on Cloud and Internet of Things (CIoT), Niteroi, Brazil, 7–9 October 2020; pp. 17–24. [Google Scholar]
  19. He, Q.; Feng, Z.; Fang, H.; Wang, X.; Zhao, L.; Yao, Y.; Yu, K. A Blockchain-Based Scheme for Secure Data Offloading in Healthcare with Deep Reinforcement Learning. IEEE/ACM Trans. Netw. 2023; early access. [Google Scholar]
  20. Cao, Y.; Yi, C.; Wan, G.; Hu, H.; Li, Q.; Wang, S. An analysis on the role of blockchain-based platforms in agricultural supply chains. Transp. Res. Part E Logist. Transp. Rev. 2022, 163, 102731. [Google Scholar] [CrossRef]
  21. Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-based federated learning for securing internet of things: A comprehensive survey. ACM Comput. Surv. 2023, 55, 1–43. [Google Scholar] [CrossRef]
  22. Rahman, M.S.; Islam, M.A.; Uddin, M.A.; Stea, G. A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges. Internet Things 2022, 19, 100551. [Google Scholar] [CrossRef]
  23. Dwivedi, S.K.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.K.R.; Vollala, S. Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Hoc Netw. 2022, 137, 102980. [Google Scholar] [CrossRef]
  24. Fahmideh, M.; Grundy, J.; Ahmad, A.; Shen, J.; Yan, J.; Mougouei, D.; Wang, P.; Ghose, A.; Gunawardana, A.; Aickelin, U.; et al. Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. ACM Comput. Surv. 2022, 55, 110. [Google Scholar] [CrossRef]
  25. Liu, D.; Huang, C.; Xue, L.; Hou, J.; Shen, X.; Zhuang, W.; Sun, R.; Ying, B. Authenticated and Prunable Dictionary for Blockchain-Based VNF Management. IEEE Trans. Wirel. Commun. 2022, 21, 9312–9324. [Google Scholar] [CrossRef]
  26. Taskou, S.K.; Rasti, M.; Nardelli, P.H. Energy and cost efficient resource allocation for blockchain-enabled NFV. IEEE Trans. Serv. Comput. 2021, 15, 2328–2341. [Google Scholar] [CrossRef]
  27. Papadakis-Vlachopapadopoulos, K.; Dimolitsas, I.; Dechouniotis, D.; Tsiropoulou, E.E.; Roussaki, I.; Papavassiliou, S. On blockchain-based cross-service communication and resource orchestration on edge clouds. Informatics 2021, 8, 13. [Google Scholar] [CrossRef]
  28. Franco, M.F.; Scheid, E.J.; Granville, L.Z.; Stiller, B. BRAIN: Blockchain-based reverse auction for infrastructure supply in virtual network functions-as-a-service. In Proceedings of the 2019 IFIP Networking Conference (IFIP Networking), Warsaw, Poland, 20–22 May 2019; pp. 1–9. [Google Scholar]
  29. Marden, J.R.; Shamma, J.S. Game theory and control. Annu. Rev. Control. Robot. Auton. Syst. 2018, 1, 105–134. [Google Scholar] [CrossRef]
  30. Leivadeas, A.; Kesidis, G.; Falkner, M.; Lambadaris, I. A graph partitioning game theoretical approach for the VNF service chaining problem. IEEE Trans. Netw. Serv. Manag. 2017, 14, 890–903. [Google Scholar] [CrossRef]
  31. Chen, X.; Zhu, Z.; Proietti, R.; Yoo, S.B. On incentive-driven VNF service chaining in inter-datacenter elastic optical networks: A hierarchical game-theoretic mechanism. IEEE Trans. Netw. Serv. Manag. 2018, 16, 18510078. [Google Scholar] [CrossRef]
  32. Gao, X.; Liu, R.; Kaushik, A. Virtual network function placement in satellite edge computing with a potential game approach. IEEE Trans. Netw. Serv. Manag. 2022, 19, 1243–1259. [Google Scholar] [CrossRef]
  33. Le, S.; Wu, Y.; Guo, Y.; Del Vecchio, C. Game theoretic approach for a service function chain routing in NFV with coupled constraints. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 3557–3561. [Google Scholar] [CrossRef]
  34. Li, J.; Shi, W.; Ye, Q.; Zhang, N.; Zhuang, W.; Shen, X. Multiservice function chain embedding with delay guarantee: A game-theoretical approach. IEEE Internet Things J. 2021, 8, 11219–11232. [Google Scholar] [CrossRef]
  35. Lima, D.H.; Aquino, A.L.; Curado, M. An NFV MANO Architecture with a Resource Allocation Mechanism Based on Game Theory. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 1009–1014. [Google Scholar]
  36. He, Q.; Wang, Y.; Wang, X.; Xu, W.; Li, F.; Yang, K.; Ma, L. Routing optimization with deep reinforcement learning in knowledge defined networking. IEEE Trans. Mob. Comput. 2023; early access. [Google Scholar]
  37. Beimel, A.; Farràs, O.; Mintz, Y.; Peter, N. Linear secret-sharing schemes for forbidden graph access structures. IEEE Trans. Inf. Theory 2021, 68, 2083–2100. [Google Scholar] [CrossRef]
  38. Open Network Automation Platform, Version: London; The Linux Foundation: San Francisco, CA, USA, 2023.
  39. Smith, C. Intro to Ethereum (Blog), 13 April 2023. Available online: https://ethereum.org/en/developers/docs/intro-to-ethereum (accessed on 18 August 2023).
  40. Khan, S.N.; Loukil, F.; Ghedira-Guegan, C.; Benkhelifa, E.; Bani-Hani, A. Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-Peer Netw. Appl. 2021, 14, 2901–2925. [Google Scholar] [CrossRef]
  41. Li, T.; Sethi, S.P. A review of dynamic Stackelberg game models. Discret. Contin. Dyn. Syst.-B 2017, 22, 125. [Google Scholar] [CrossRef]
  42. Lai, J.; Deng, R.H.; Li, Y. Fully secure cipertext-policy hiding CP-ABE. In Proceedings of the Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, 30 May–1 June 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 24–39. [Google Scholar]
  43. Das, S.; Namasudra, S. Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure. IEEE Trans. Ind. Inform. 2022, 19, 821–829. [Google Scholar] [CrossRef]
Figure 1. Traditional access control model.
Figure 1. Traditional access control model.
Sensors 23 09343 g001
Figure 2. System Framework.
Figure 2. System Framework.
Sensors 23 09343 g002
Figure 3. Plots of  P j i  in two different sets of parameters.
Figure 3. Plots of  P j i  in two different sets of parameters.
Sensors 23 09343 g003
Figure 4. Structure of Run-time in ONAP.
Figure 4. Structure of Run-time in ONAP.
Sensors 23 09343 g004
Figure 5. RO’s pricing strategy under different utility parameters.
Figure 5. RO’s pricing strategy under different utility parameters.
Sensors 23 09343 g005
Figure 6. The relationship between social utility and the number of resource types.
Figure 6. The relationship between social utility and the number of resource types.
Sensors 23 09343 g006
Figure 7. The relationship between social utility and the number of ROs.
Figure 7. The relationship between social utility and the number of ROs.
Sensors 23 09343 g007
Figure 8. The relationship between Running time and the number of resource types.
Figure 8. The relationship between Running time and the number of resource types.
Sensors 23 09343 g008
Figure 9. The relationship between Running time and the number of ROs.
Figure 9. The relationship between Running time and the number of ROs.
Sensors 23 09343 g009
Figure 10. Encryption time comparison.
Figure 10. Encryption time comparison.
Sensors 23 09343 g010
Figure 11. Decryption time comparison.
Figure 11. Decryption time comparison.
Sensors 23 09343 g011
Table 1. Variable notations of Resource Sharing Model.
Table 1. Variable notations of Resource Sharing Model.
SymbolDescription
  r i The demand for resource i
  μ i The unit cost of resource i for IP
C P i C P The cost of resource i and the total cost of VNF
  σ j The degree of relevance between IV and  R O j
  υ i The utility level of resource i
  r i 0 , r i j The variable whether resource j is deployed on a shared node  R O j  or as an exclusive resource
  U i j The utility function for deploying resource i to  R O j
  F i j The available quantity of resource i within  R O j  during the available time period
  ρ i j The unit price for resource i in  R O j
  κ i The unit retail price for resource i of IP
  P I The sum resulting profit for IP
  λ i j The cost level of  R O j  for resource i
  C i j The Cost function for deploying resource i to  R O j
  P R j The profit of the  R O j
  R S i j Resource i is shared with  R O j
  N R S i Resource i is allocated by an exclusive resource
Table 2. Major simulation parameters.
Table 2. Major simulation parameters.
ParameterValue
Number of ROsRandom from 1 to 50
Resource requirement vector lengthsRandom from 1 to 10
  r i Random from 1 to 50
  σ j Uniform distribution, ranging from 0.1 to 0.9
  λ i j Uniform distribution, ranging from 0.1 to 0.9
  μ i Random from 100 to 300
  κ i 25% to 35% higher than  μ i  randomly
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dong, A.; Wang, X.; Yi, B.; He, Q.; Huang, M. Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain. Sensors 2023, 23, 9343. https://doi.org/10.3390/s23239343

AMA Style

Dong A, Wang X, Yi B, He Q, Huang M. Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain. Sensors. 2023; 23(23):9343. https://doi.org/10.3390/s23239343

Chicago/Turabian Style

Dong, Anwei, Xingwei Wang, Bo Yi, Qiang He, and Min Huang. 2023. "Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain" Sensors 23, no. 23: 9343. https://doi.org/10.3390/s23239343

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop