SECUPerf: End-to-End Security and Performance Assessment of Cloud Services

被引:0
|
作者
Xiong, Kaiqi [1 ]
Pantangi, Ajay [2 ]
Makati, Mufaddal [2 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Rochester Inst Technol, Rochester, NY 14623 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/TrustCom.2016.266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the International Data Corporation (IDC) estimated, public cloud services spending reached nearly $70B in 2015. While enterprise and public adoption of cloud applications and services is accelerating over time, security and performance remain as dominant concerns. As many studies try to address the security and performance of cloud data centers and cloud networks, it is unclear how to evaluate the end-to-end security and performance of cloud services. In this paper, we design and develop SECUPerf, a security and performance assessment approach, to address the aforementioned question. Furthermore, we leverage the Global Environment for Network Environments (GENI) to collect the security and performance metrics of cloud services and then evaluate SECUPerf on GENI. This paper focuses on the design and experimental evaluation procedure of SECUPerf. Our experiments show their effectiveness.
引用
收藏
页码:1747 / 1752
页数:6
相关论文
共 50 条
  • [31] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [32] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [33] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [34] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [35] Performance Evaluation on End-to-End Security Architecture for Mobile Banking System
    Narendiran, C.
    Rabara, S. Albert
    Rajendran, N.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 445 - +
  • [36] End-to-end Java security performance enhancements for oracle SPARC servers
    Oracle, 4180 Network Circle, Santa Clara
    CA
    95054, United States
    不详
    CA
    94025, United States
    ICPE - Proc. ACM/SPEC Int. Conf. Perform. Eng., (159-166):
  • [37] End-to-end integrated security and performance analysis on the DEGAS choreographer platform
    Buchholtz, M
    Gilmore, S
    Haenel, V
    Montangero, C
    FM 2005: FORMAL METHODS, PROCEEDINGS, 2005, 3582 : 286 - 301
  • [38] Performance evaluation of an end-to-end rate control approach for ABR services
    Chen, JR
    Chen, YC
    Chan, CT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1998, E81B (12) : 2400 - 2412
  • [39] Performance evaluation of an end-to-end rate control approach for ABR services
    Natl Chiao Tung Univ, Hsinchu, Taiwan
    IEICE Trans Commun, 12 (2400-2412):
  • [40] Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services
    Ahmed, Faraz
    Erman, Jeffrey
    Ge, Zihui
    Liu, Alex X.
    Wang, Jia
    Yan, He
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,