An Adaptive Approach to Optimizing Tradeoff Between Service Performance and Security in Service-Based Systems

An Adaptive Approach to Optimizing Tradeoff Between Service Performance and Security in Service-Based Systems

Stephen S. Yau, Yin Yin, Ho An
Copyright: © 2011 |Pages: 18
DOI: 10.4018/jwsr.2011040104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The message-based communication among services in Service-based Systems (SBS) is vulnerable to various security attacks and must be well protected by security mechanisms, which may affect performance due to available system resources. In this paper, an adaptive approach is presented to optimize the tradeoff between service performance and security according to SBS users’ requirements and preferences on performance and security. This adaptive approach is based on a tradeoff algorithm with quantitative performance and security metrics and the tradeoff objective function. An SBS example with a security service and a traffic service is used to illustrate the approach.
Article Preview
Top

1. Introduction

Service-oriented architecture (SOA) facilitates dynamic organization of needed services to compose a system for performing application functions, where each service communicates with other services through messages. Distributed systems based on SOA are called service-based systems (SBS). Although message-based communication makes SBS easier to use services, the protection of the communication messages is a serious security concern of SBS.

Current research on SOA security mainly focuses on the protection of services from malicious consumers through authentication and authorization (Godik & Moses, 2003; Hallam-Baker & Mysore, 2005; Hallam-Baker & Mysore, 2005; Bajaj et al., 2004; Pashalidis & Mitchell, 2003) and the protection of messages through XML encryption and signature (Mactaggart, 2001). However, the impact of these security mechanisms on the systems' performance has not been well addressed. Security requirements are often in contrast to other performance requirements, like timeliness and throughput, which are usually determined by the availability of system resources. For example, when a VoIP service needs to provide secure voice communication, it sends the voice data to an encryption service, which will encrypt the voice data and then forward the encrypted voice data to the users of VoIP service. The encryption service increases the delay of VoIP service in two ways. First, the VoIP users need to wait for the encryption service to encrypt voice data, which increases the delay. Second, if the VoIP service and the encryption service are hosted on the same server, the encryption service may compete with the VoIP service for system resources, such as CPU and memory, and causes longer delay. Because VoIP service has strict timeliness requirements (Cheng & Li, 2000), without careful control on the encryption service’s negative impact on the VoIP service’s delay, the VoIP service may either do not use the encryption service at all or became useless due to unaffordable delay caused by the encryption service.

In this paper, we will present an adaptive approach to optimizing tradeoff between service performance and security in order to satisfy service performance and security requirements in service-based systems simultaneously (Yau, Ye, Sarjoughian, & Huang, 2008). Typically, the tradeoff between performance and security is implemented through controlling the number of system resources allocated for performance and security. This approach needs to model all system resources and control resource allocation strategy, which is usually controlled by operating systems. Our approach to the tradeoff is to adjust the security parameters, such as key length and encrypting percentage, which are much easier to control. The major distinction between our approach and existing approaches (Lie & Satyanarayanan, 2007; Yurcik, Woolam, Hellings, Khan, & Thuraisingham, 2007; Lu, Lu, Abdelzaher, Stankovic, & Son, 2006; Kang & Son, 2006; Son, Zimmerman, & Hansson, 2000; Spyropoulou, Levin, & Irvine, 2000; Yau, Yan, & Huang, 2007) is that our approach can achieve the best tradeoff by minimizing a tradeoff objective function developed from service performance and security metrics, instead of intuitively trying all possible combinations of security parameters and monitoring the resulting performance and security until the desirable tradeoff is reached. Hence, our approach can achieve the best tradeoff fast and does not need to change security parameters frequently. Our approach is based on a model with a set of metrics to quantitatively measure performance and security and a tradeoff objective function, which enable us to consider performance and security simultaneously. Our approach will be illustrated using a SBS composed of a security service that provides AES encryption for confidentiality and a traffic service that simulates communication in applications.

Complete Article List

Search this Journal:
Reset
Volume 21: 1 Issue (2024)
Volume 20: 1 Issue (2023)
Volume 19: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 18: 4 Issues (2021)
Volume 17: 4 Issues (2020)
Volume 16: 4 Issues (2019)
Volume 15: 4 Issues (2018)
Volume 14: 4 Issues (2017)
Volume 13: 4 Issues (2016)
Volume 12: 4 Issues (2015)
Volume 11: 4 Issues (2014)
Volume 10: 4 Issues (2013)
Volume 9: 4 Issues (2012)
Volume 8: 4 Issues (2011)
Volume 7: 4 Issues (2010)
Volume 6: 4 Issues (2009)
Volume 5: 4 Issues (2008)
Volume 4: 4 Issues (2007)
Volume 3: 4 Issues (2006)
Volume 2: 4 Issues (2005)
Volume 1: 4 Issues (2004)
View Complete Journal Contents Listing