SECUPerf: End-to-End Security and Performance Assessment of Cloud Services

被引:0
|
作者
Xiong, Kaiqi [1 ]
Pantangi, Ajay [2 ]
Makati, Mufaddal [2 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Rochester Inst Technol, Rochester, NY 14623 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/TrustCom.2016.266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the International Data Corporation (IDC) estimated, public cloud services spending reached nearly $70B in 2015. While enterprise and public adoption of cloud applications and services is accelerating over time, security and performance remain as dominant concerns. As many studies try to address the security and performance of cloud data centers and cloud networks, it is unclear how to evaluate the end-to-end security and performance of cloud services. In this paper, we design and develop SECUPerf, a security and performance assessment approach, to address the aforementioned question. Furthermore, we leverage the Global Environment for Network Environments (GENI) to collect the security and performance metrics of cloud services and then evaluate SECUPerf on GENI. This paper focuses on the design and experimental evaluation procedure of SECUPerf. Our experiments show their effectiveness.
引用
收藏
页码:1747 / 1752
页数:6
相关论文
共 50 条
  • [41] A survey on end-to-end point cloud learning
    Tang, Xikai
    Huang, Fangzheng
    Li, Chao
    Ban, Dayan
    IET IMAGE PROCESSING, 2023, 17 (05) : 1307 - 1321
  • [42] CCAG: End-to-End Point Cloud Registration
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Liu, Yangyang
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (01) : 435 - 442
  • [43] End-to-end point cloud registration with transformer
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Zhang, Qi
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 58 (01)
  • [44] End-to-End Cloud Application Cloning With Ditto
    Liang, Hmingyu
    Gan, Yu
    Li, Yueying
    Torres, Carlos
    Dhanotia, Abhishek
    Ketkar, Mahesh
    Delimitrou, Christina
    IEEE MICRO, 2024, 44 (04) : 34 - 43
  • [45] Converged Network-Cloud Service Composition with End-to-End Performance Guarantee
    Huang, Jun
    Duan, Qiang
    Guo, Song
    Yan, Yuhong
    Yu, Shui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 545 - 557
  • [46] Performance Analysis of End-to-End Sensor-to-Cloud Personal Living Platform
    Goleva, Rossitza
    Stainov, Rumen
    Kletnikov, Nikola
    Achkoski, Jugoslav
    Mirtchev, Seferin
    Ganchev, Ivan
    Savov, Aleksandar
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 615 - 620
  • [47] The study on end-to-end security for ubiquitous commerce
    Chang, Hangbae
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 228 - 245
  • [48] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [49] The study on end-to-end security for ubiquitous commerce
    Hangbae Chang
    The Journal of Supercomputing, 2011, 55 : 228 - 245
  • [50] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794