Performance evaluation of security services: An experimental approach

被引:1
|
作者
Cilardo, Alessandro [1 ]
Coppolino, Luigi [1 ]
Mazzeo, Antonino [1 ]
Romano, Luigi [2 ]
机构
[1] Univ Napoli Federico II, Dipartimento Informat & Sistemist, Via Claudio 21, I-80125 Naples, Italy
[2] Univ Napoli Parthenope, Dipartimento Tecnol, I-80133 Naples, Italy
关键词
performance; security; ubiquitous computing; mobile devices; web services;
D O I
10.1109/PDP.2007.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in wireless technologies have enabled pervasive connectivity to Internet scale systems which include heterogeneous mobile devices, such as mobile phones and Personal Digital Assistants, a trend which is generally referred to as ubiquitous computing. This leads to the need for providing security functions to applications which are partially deployed over wireless devices. Delivering security services to mobile devices raises a number of challenging issues, mostly related to the limited amount of computing power which is typically available on the target platforms. Some promising solutions rely on multi-tier architectures, which are based on the emerging Web Services technology. In this scenario, understanding the impact of architectural characteristics of specific plalforms is a key issue for practitioners who have to develop and deploy efficient security-enabled applications on mobile devices. This paper provides an experimental study of the impact that specific characteristics of individual mobile device platforms have on the final performance of security applications. Focus is on performance and resource utilization, which are key aspects when one develops applications on mobile devices. The case study is a Web Services based solution for delivering Public Key Infrastructure (PKI) Services to Mobile Devices. Experiments have been conducted on three different mobile terminals, which span a large range of characteristics in the class of resource-constrained devices. Results show that: i) performance figures are not uniform. in spite of similar underlying hardware characteristics, and ii) security and performance are often conflicting requirements.
引用
收藏
页码:387 / +
页数:3
相关论文
共 50 条
  • [21] Security and Performance of Mobile XML Web Services
    Nguyen, Thao Thanh
    Jorstad, Ivar
    van Thanh, Do
    [J]. FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICNS 2008), PROCEEDINGS, 2008, : 261 - 265
  • [22] Web services security - Implementation and evaluation issues
    Pimenidis, Elias
    Georgiadis, Christos K.
    Bako, Peter
    Zorkadis, Vassilis
    [J]. GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 299 - +
  • [23] A Performance Approach to Mobile Security
    Pavloski, Mihajlo
    [J]. 2016 IEEE 24TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), 2016, : 325 - 330
  • [24] Security-Centric Evaluation Framework for IT Services
    Gupta, Smrati
    Ferrarons-Llagostera, Jaume
    Dominiak, Jacek
    Muntes-Mulero, Victor
    Matthews, Peter
    Rios, Erkuden
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 736 - 747
  • [25] Performance comparison of security mechanisms for grid services
    Shirasuna, S
    Slominski, A
    Fang, L
    Gannon, D
    [J]. FIFTH IEEE/ACM INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2004, : 360 - 364
  • [26] Choreographing security and performance analysis for web services
    Gilmore, S
    Haenel, V
    Kloul, L
    Maidl, M
    [J]. FORMAL TECHNIQUES FOR COMPUTER SYSTEMS AND BUSINESS PROCESSES, PROCEEDINGS, 2005, 3670 : 200 - 214
  • [27] A Combined Grid Security Approach Based on Web Services Security Specifications
    Zhang, Zhongping
    Wang, Kunbo
    Luan, Jianfeng
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 414 - 418
  • [28] TEACHING BEHAVIORAL-ASPECTS OF PERFORMANCE EVALUATION - AN EXPERIMENTAL APPROACH
    UMAPATHY, S
    [J]. ACCOUNTING REVIEW, 1985, 60 (01): : 97 - 108
  • [29] Towards Security Effectiveness Evaluation for Cloud Services Selection following a Risk-Driven Approach
    Maroc, Sarah
    Zhang, Jian Biao
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 20 - 31
  • [30] APPROACH TO EVALUATION OF CLINICAL SERVICES
    ROWITZ, L
    ADAMS, J
    BARRETT, T
    [J]. MENTAL RETARDATION, 1974, 12 (04): : 6 - 9