Overhead Analysis of Security Primitives in Cloud

Gaurav Somani, Akash Agarwal, Shrutika Ladha
{"title":"Overhead Analysis of Security Primitives in Cloud","authors":"Gaurav Somani, Akash Agarwal, Shrutika Ladha","doi":"10.1109/ISCOS.2012.19","DOIUrl":null,"url":null,"abstract":"Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Symposium on Cloud and Services Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCOS.2012.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.
云环境中安全原语的开销分析
云计算为其用户提供了享受效用计算模式的好处。安全问题在云计算中变得更加复杂,因为客户端不具有数据的物理所有权,需要在多个级别上附加安全原语。这项工作检查了云中的安全原语的开销,并显示了用于保护云中的web应用程序的安全技术存在的成本-时间权衡。实验表明,与没有这些额外安全原语的传统环境相比,这些额外的安全原语需要许多倍的计算资源。重要的是,它会导致较差的响应时间,因为额外的安全性需要额外的计算。除此之外,已经证明,需要大量额外的资源才能使响应时间等同于传统安全或非云环境中的响应时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信