Abstract:
Next Generation Networks (NGN) are packet-switched telecommunications architectures that rely on IP technology to support a broad range of services. In contrast, the IP Multimedia Subsystem (IMS) functions as the control and service framework that allows multimedia applications to operate over NGN. In simple terms, NGN provides the underlying network infrastructure, while IMS acts as the platform within that infrastructure that manages multimedia services such as voice and video communication for end users. Ensuring security for users, services, and providers is a critical priority. The increasing complexity of cyber threats, the wide variety of services, and the extensive use of distributed cloud environments make comprehensive security more important than ever. This paper proposes an integrated security mechanism aimed at strengthening protection for users, services, and providers within the IMS framework by tightly integrating IMS architecture with cloud computing environments. By leveraging multiple advanced security features, layered protection strategies, and control mechanisms inherent in cloud computing, the proposed approach enhances the system’s overall reliability, confidentiality, and resilience. This paper presents an integration between two fields: telecommunication services and network concepts along with open technologies, aiming to provide an open service creation framework and to leverage the security mechanisms offered by cloud-based authentication, but not discuss the impact of the security mechanisms implementation to the QoS, latency, throughput.
Keywords: IMS, Cloud Computing, OpenStack, Security, SIP.
References
Abdullah Ehsan Shaikh, and Simon Yusuf Enoch, 2024. “Threat-specific risk assessment for IP multimedia subsystem networks based on hierarchical models.” 20-22 December 2024 International Conference on Ubiquitous Computing and Communications (IUCC) December 20-22 2024 Chengdu-China : 123-130. doi :10.1109/IUCC65928.2024.00034.
Balan, I., Adrian Graur, and Alin Potorac, 2018, “Security assessment of OpenStack cloud using outside and inside software tools.” 14th International Conference on Development and Application Systems, Suceava, Romania, May 24-26 2018: 170–174. doi:10.1109/DAAS.2018 .8396091.
CSA cloud Security Alliance. 2025. “Security guidance for critical areas of focus in cloud computing v5.” https://cloudsecurity alliance .org /artifacts/security-guidance-v5.
Dodd-Noble A., Gundavelli, A and Korhonen, J. 2015. “3GPP IP multimedia subsystems (IMS) option, for the internet key exchange protocol version2 (IKEV2).” RFC7651.
Enisa. 2015. “ Cloud security guide for SMEs.”, ISBN: 978-92-9204-122-9 https://github.Com/ leuk7/open IMSCoreAndServices.
Giuseppe C., Marius C., and Paolo C. 2014. “Cloudified IP multimedia subsystem (IMS) for network function virtualization (NFV)-based architectures.” IEEE Symposium on Computers and Communications (ISCC) 2014. doi:10.1109 /ISCC.2014.6912647.
Handoura, A. 2018. “Secure intelligent services, sip handbook: Services, technologies, and security of session initiation protocol.” Book ISBN 97813 15218939: Chapter 21. https://doi.org/10.1201/9 78131 5218939.
Jaiswal, D. 2025. “Cloud-native transformation of SIP/IMS core networks: A microservices Architecture for next-generation telecomunications.” Sarcouncil Journal of Multidisciplinary, Volume 05, Issue 07-2025: 907–918. https://doi.org/10. 52 81/zenodo.16419992.
Maleki Hoda. 2019. “Towards security analysis of OpenStack.”, Doctor of Philosophy Dissertation 2181. University of Connecticut – Storrs. https://digitalcommons.lib.uconn.edu/dissertations/2181.
Mehradad Mizani, 2017 “Cloud-based Computing. Key advanced in clinical information.” Elseiver: 239–255. https://doi.org/10.1016/B978-0-12-809 523-2.00017-0.
Mohamed Khalaf Alla H. M, Amin Babikerb, and Magdi. B. M. 2016. “Review in cloud based next generation telecommunication network.” Jurnal Teknologi: 51–57. https://doi.org/10.11113/jt.v7 8.5135.
Mojka.V, and Mitja S. 2010. “IP multimedia subsystem. a guide to wireless communication engineering technologies.” Book Chapter 15: 317–336. https://doi.org/10.1201/9781315219011.
Sanou J L. 2021. “Open-imscore school project.” Github https://github.com/leuk7/openIMSCoreA ndServices.
Sasko R., Marjan G., and Aleksandar D. 2014. “Security vulnerabil-ity assessment of OpenStack cloud.” Sixth International Conference on Computational Intelligence, Communication Systems and Networks may 27-29 2014: 95-100.doi:10.1109/CICSyN.2014.32.
Wei Zhang, Weimin Lei, and Xiao Chen. 2013. “Architecture and key issues of IMS-based cloud computing.” IEEE Sixth International Conference on Cloud Computing. June 28- jully 03 2013: 629-35.https://doi.org/10.1109/CLOUD.2013.34

