Performance evaluation of security services: An experimental approach

被引:1
作者
Cilardo, Alessandro [1 ]
Coppolino, Luigi [1 ]
Mazzeo, Antonino [1 ]
Romano, Luigi [2 ]
机构
[1] Univ Napoli Federico II, Dipartimento Informat & Sistemist, Via Claudio 21, I-80125 Naples, Italy
[2] Univ Napoli Parthenope, Dipartimento Tecnol, I-80133 Naples, Italy
来源
15TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS | 2007年
关键词
performance; security; ubiquitous computing; mobile devices; web services;
D O I
10.1109/PDP.2007.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in wireless technologies have enabled pervasive connectivity to Internet scale systems which include heterogeneous mobile devices, such as mobile phones and Personal Digital Assistants, a trend which is generally referred to as ubiquitous computing. This leads to the need for providing security functions to applications which are partially deployed over wireless devices. Delivering security services to mobile devices raises a number of challenging issues, mostly related to the limited amount of computing power which is typically available on the target platforms. Some promising solutions rely on multi-tier architectures, which are based on the emerging Web Services technology. In this scenario, understanding the impact of architectural characteristics of specific plalforms is a key issue for practitioners who have to develop and deploy efficient security-enabled applications on mobile devices. This paper provides an experimental study of the impact that specific characteristics of individual mobile device platforms have on the final performance of security applications. Focus is on performance and resource utilization, which are key aspects when one develops applications on mobile devices. The case study is a Web Services based solution for delivering Public Key Infrastructure (PKI) Services to Mobile Devices. Experiments have been conducted on three different mobile terminals, which span a large range of characteristics in the class of resource-constrained devices. Results show that: i) performance figures are not uniform. in spite of similar underlying hardware characteristics, and ii) security and performance are often conflicting requirements.
引用
收藏
页码:387 / +
页数:3
相关论文
共 23 条
  • [11] Housley R., 2002, 3280 IETF RFC
  • [12] KALISKI B, 1998, 2314 RFC
  • [13] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [14] KOLSI O, 2004, P 3M ANN HAW INT C S, P287
  • [15] Kreger H., 2001, WEB SERVICES CONCEPT
  • [16] MATSUOKA Y, 2004, P INT C COMP ARCH SY, P303
  • [17] *NOK, NOK WEB SERV FRAM DE
  • [18] RAMSDELL B, 1999, 2633 IETF RFC
  • [19] Domain-specific codesign for embedded security
    Schaumont, P
    Verbauwbede, I
    [J]. COMPUTER, 2003, 36 (04) : 68 - +
  • [20] *SUN, J2ME PERS PROF ZAUR