SECUPerf: End-to-End Security and Performance Assessment of Cloud Services

被引:0
|
作者
Xiong, Kaiqi [1 ]
Pantangi, Ajay [2 ]
Makati, Mufaddal [2 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Rochester Inst Technol, Rochester, NY 14623 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/TrustCom.2016.266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the International Data Corporation (IDC) estimated, public cloud services spending reached nearly $70B in 2015. While enterprise and public adoption of cloud applications and services is accelerating over time, security and performance remain as dominant concerns. As many studies try to address the security and performance of cloud data centers and cloud networks, it is unclear how to evaluate the end-to-end security and performance of cloud services. In this paper, we design and develop SECUPerf, a security and performance assessment approach, to address the aforementioned question. Furthermore, we leverage the Global Environment for Network Environments (GENI) to collect the security and performance metrics of cloud services and then evaluate SECUPerf on GENI. This paper focuses on the design and experimental evaluation procedure of SECUPerf. Our experiments show their effectiveness.
引用
收藏
页码:1747 / 1752
页数:6
相关论文
共 50 条
  • [21] Towards a Holistic Cloud System with End-to-End Performance Guarantees
    Andreoli, Remo
    Cucinotta, Tommaso
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING, IC2E, 2023, : 236 - 238
  • [22] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [23] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [24] Flexible IoT security middleware for end-to-end cloud-fog communication
    Mukherjee, Bidyut
    Wang, Songjie
    Lu, Wenyi
    Neupane, Roshan Lal
    Dunn, Daniel
    Ren, Yijie
    Su, Qi
    Calyam, Prasad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 688 - 703
  • [25] End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum
    Tusa, Francesco
    Clayman, Stuart
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 473 - 488
  • [26] Anycast End-to-end Resilience for Cloud Services over Virtual Optical Networks
    Minh Bui
    Jaumard, Brigitte
    Develder, Chris
    2013 15TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2013), 2013,
  • [27] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [28] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [29] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [30] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339