Visible to the public Assessing Run-time Overhead of Securing KeplerConflict Detection Enabled

TitleAssessing Run-time Overhead of Securing Kepler
Publication TypeConference Proceedings
Year of Publication2016
AuthorsKim, Donghoon, Vouk, Mladen A.
Conference NameThe International Conference on Computational Science, ICCS 2016
Volume80
Pagination2281-2286
Date Published2016
PublisherElsevier
Conference LocationSan Diego, CA
Abstract

We have developed a model for securing data-flow based application chains. We have imple- mented the model in the form of an add-on package for the scientific workflow system called Kepler. Our Security Analysis Package (SAP) leverages Kepler's Provenance Recorder (PR). SAP secures data flows from external input-based attacks, from access to unauthorized exter- nal sites, and from data integrity issues. It is not a surprise that cost of real-time security is a certain amount of run-time overhead. About half of the overhead appears to come from the use of the Kepler PR and the other half from security function added by SAP.

DOIhttps://doi.org/10.1016/j.procs.2016.05.412
Citation Keynode-38140
Refereed DesignationRefereed