Assessing Run-time Overhead of Securing Kepler

被引:2
|
作者
Kim, Donghoon [1 ]
Vouk, Mladen A. [1 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Kepler; security; provenance; data integrity; performance overhead;
D O I
10.1016/j.procs.2016.05.412
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We have developed a model for securing data-flow based application chains. We have implemented the model in the form of an add-on package for the scientific workflow system called Kepler. Our Security Analysis Package (SAP) leverages Kepler's Provenance Recorder (PR). SAP secures data flows from external input-based attacks, from access to unauthorized external sites, and from data integrity issues. It is not a surprise that cost of real-time security is a certain amount of run-time overhead. About half of the overhead appears to come from the use of the Kepler PR and the other half from security function added by SAP.
引用
收藏
页码:2281 / 2286
页数:6
相关论文
共 50 条
  • [21] Using the planning scheduler in real-time fieldbuses: Theoretical model for run-time overhead
    Almeida, L
    Pasadas, R
    Fonseca, JA
    [J]. WFCS '97 - 1997 IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS, PROCEEDINGS, 1997, : 103 - 109
  • [22] RUN-TIME DEBUGGERS
    NELSON, T
    [J]. DR DOBBS JOURNAL, 1993, 18 (12): : 36 - 36
  • [23] Run-time correction
    Grubb, WA
    [J]. OIL & GAS JOURNAL, 2004, 102 (13) : 10 - 10
  • [24] Run-time verification
    Colin, S
    Mariani, L
    [J]. MODEL-BASED TESTING OF REACTIVE SYSTEMS, 2005, 3472 : 525 - 555
  • [25] Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan
    Cheng, Jian
    Feng, Quanyuan
    Li, Chao
    Yang, Wenxiu
    [J]. WIRELESS NETWORKS, 2024, 30 (06) : 5455 - 5463
  • [26] Considering run-time reconfiguration overhead in task graph transformations for dynamically reconfigurable architectures
    Banerjee, S
    Bozorgzadeh, E
    Dutt, N
    [J]. FCCM 2005: 13TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2005, : 273 - 274
  • [27] A Study of Utilization Bound and Run-Time Overhead for Cluster Scheduling in Multiprocessor Real-Time Systems
    Qi, Xuan
    Zhu, Dakai
    Aydin, Hakan
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA 2010), 2010, : 3 - 12
  • [28] Run-time reconfiguration at Xilinx
    Guccione, SA
    [J]. PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 873 - 873
  • [29] Run-Time Verification of Coboxes
    de Boer, Frank S.
    de Gouw, Stijn
    Wong, Peter Y. H.
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 259 - 273
  • [30] A complete run-time overhead-aware schedulability analysis for MrsP under nested resources
    Zhao, Shuai
    Garrido, Jorge
    Wei, Ran
    Burns, Alan
    Wellings, Andy
    de la Puente, Juan A.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 159