{"title":"Overhead Analysis of Security Primitives in Cloud","authors":"Gaurav Somani, Akash Agarwal, Shrutika Ladha","doi":"10.1109/ISCOS.2012.19","DOIUrl":null,"url":null,"abstract":"Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Symposium on Cloud and Services Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCOS.2012.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.