Assessing Run-time Overhead of Securing Kepler
Title | Assessing Run-time Overhead of Securing Kepler |
Publication Type | Conference Proceedings |
Year of Publication | 2016 |
Authors | Kim, Donghoon, Vouk, Mladen A. |
Conference Name | The International Conference on Computational Science, ICCS 2016 |
Volume | 80 |
Pagination | 2281-2286 |
Date Published | 2016 |
Publisher | Elsevier |
Conference Location | San Diego, CA |
Abstract | We have developed a model for securing data-flow based application chains. We have imple- mented the model in the form of an add-on package for the scientific workflow system called Kepler. Our Security Analysis Package (SAP) leverages Kepler's Provenance Recorder (PR). SAP secures data flows from external input-based attacks, from access to unauthorized exter- nal sites, and from data integrity issues. It is not a surprise that cost of real-time security is a certain amount of run-time overhead. About half of the overhead appears to come from the use of the Kepler PR and the other half from security function added by SAP. |
DOI | https://doi.org/10.1016/j.procs.2016.05.412 |
Citation Key | node-38140 |
Refereed Designation | Refereed |
Groups: