云环境中安全原语的开销分析

Gaurav Somani, Akash Agarwal, Shrutika Ladha
{"title":"云环境中安全原语的开销分析","authors":"Gaurav Somani, Akash Agarwal, Shrutika Ladha","doi":"10.1109/ISCOS.2012.19","DOIUrl":null,"url":null,"abstract":"Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Overhead Analysis of Security Primitives in Cloud\",\"authors\":\"Gaurav Somani, Akash Agarwal, Shrutika Ladha\",\"doi\":\"10.1109/ISCOS.2012.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.\",\"PeriodicalId\":138078,\"journal\":{\"name\":\"2012 International Symposium on Cloud and Services Computing\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Symposium on Cloud and Services Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCOS.2012.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Symposium on Cloud and Services Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCOS.2012.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

云计算为其用户提供了享受效用计算模式的好处。安全问题在云计算中变得更加复杂,因为客户端不具有数据的物理所有权,需要在多个级别上附加安全原语。这项工作检查了云中的安全原语的开销,并显示了用于保护云中的web应用程序的安全技术存在的成本-时间权衡。实验表明,与没有这些额外安全原语的传统环境相比,这些额外的安全原语需要许多倍的计算资源。重要的是,它会导致较差的响应时间,因为额外的安全性需要额外的计算。除此之外,已经证明,需要大量额外的资源才能使响应时间等同于传统安全或非云环境中的响应时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Overhead Analysis of Security Primitives in Cloud
Cloud computing provides its users to enjoy the benefits of utility computing model. Security issues becomes more complicated in cloud as clients do not have physical possession of data, requiring additional security primitives at multiple levels. This work examines the overheads of security primitives in cloud and shows a cost-time trade off in presence of security techniques which is used to secure web applications in cloud. Experiments show that the additional security primitives require many fold computational resources as compared to traditional environment where these additional security primitives are not available. Importantly, it leads to poor response time as the additional security requires additional computation. In addition to this, it has been shown that large amount of additional resources are needed to equate the response time to the response time in traditional security or noncloud environments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
HTV Dynamic Load Balancing Algorithm for Virtual Machine Instances in Cloud Delivering LBA with LBS Using Service-Oriented Architecture Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing TCP Variants for Data Center Networks: A Comparative Study Operational Flexibility in Smart Grid through Cloud Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1