Skip to main content

2015 | OriginalPaper | Buchkapitel

On the Balancing Security Against Performance in Database Systems

verfasst von : Damian Rusinek, Bogdan Ksiezopolski, Adam Wierzbicki

Erschienen in: Computer Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Balancing security against performance for IT systems is one of the most important issues to be solved. The quality of protection of systems can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible security mechanisms. Unfortunately, the strongest protection can lead to unreasoned increase of the system load and finally influence system availability. In such a situation the quality of protection models which scale the protection level depending on the specific requirements can be used. In the article, we present the approach which enables balancing security against performance for database systems. The analysis is performed by Automated Quality of Protection Analysis (AQoPA) tool which allow automatic evaluation of system models which are created in the Quality of Protection Modelling Language (QoP-ML).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: Adaptive approach to network security. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2009. CCIS, vol. 39, pp. 233–241. Springer, Heidelberg (2009) CrossRef Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: Adaptive approach to network security. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2009. CCIS, vol. 39, pp. 233–241. Springer, Heidelberg (2009) CrossRef
2.
Zurück zum Zitat Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems. In: European Teletraffic Seminar, pp. 195–202 (2011) Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems. In: European Teletraffic Seminar, pp. 195–202 (2011)
3.
Zurück zum Zitat Stubblefield, A., Rubin, A.D., Wallach, D.S.: Managing the performance impact of web security. Electron. Commer. Res. 5, 99–116 (2005) Stubblefield, A., Rubin, A.D., Wallach, D.S.: Managing the performance impact of web security. Electron. Commer. Res. 5, 99–116 (2005)
4.
Zurück zum Zitat Sklavos, N., Kitsos, P., Papadopoulos, K., Koufopavlou, O.: Design, architecture and performance evaluation of the wireless transport layer security. J. Supercomputing 36(1), 33–50 (2006) Sklavos, N., Kitsos, P., Papadopoulos, K., Koufopavlou, O.: Design, architecture and performance evaluation of the wireless transport layer security. J. Supercomputing 36(1), 33–50 (2006)
5.
Zurück zum Zitat Ksiezopolski, B., Kotulski, Z.: On scalable security model for sensor networks protocols. In: 22nd CIB-W78 Conference Information Technology in Construction, Dresden, pp. 463–469 (2005) Ksiezopolski, B., Kotulski, Z.: On scalable security model for sensor networks protocols. In: 22nd CIB-W78 Conference Information Technology in Construction, Dresden, pp. 463–469 (2005)
6.
Zurück zum Zitat Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: On authentication method impact upon data sampling delay in wireless sensor networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 280–289. Springer, Heidelberg (2010) CrossRef Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: On authentication method impact upon data sampling delay in wireless sensor networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 280–289. Springer, Heidelberg (2010) CrossRef
7.
Zurück zum Zitat Jürjens, J.: Security and compliance in clouds. In: IT-Compliance 2011, Berlin, 4th Pan-European Conference (2011) Jürjens, J.: Security and compliance in clouds. In: IT-Compliance 2011, Berlin, 4th Pan-European Conference (2011)
8.
Zurück zum Zitat Khan, J.I., Wierzbicki, A.: Foundations of Peer-to-Peer Computing (2008) Khan, J.I., Wierzbicki, A.: Foundations of Peer-to-Peer Computing (2008)
9.
Zurück zum Zitat Wierzbicki, A., Szczepaniak, R., Buszka, M.: Application layer multicast for efficient peer-to-peer applications. In: Proceedings of the Third IEEE Workshop on Internet Applications, WIAPP 2003. IEEE (2003) Wierzbicki, A., Szczepaniak, R., Buszka, M.: Application layer multicast for efficient peer-to-peer applications. In: Proceedings of the Third IEEE Workshop on Internet Applications, WIAPP 2003. IEEE (2003)
10.
Zurück zum Zitat Wierzbicki, A., Zwierko, A., Kotulski, A.: Authentication with controlled anonymity in P2P systems. In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005. IEEE (2005) Wierzbicki, A., Zwierko, A., Kotulski, A.: Authentication with controlled anonymity in P2P systems. In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005. IEEE (2005)
11.
Zurück zum Zitat Wierzbicki, A.: The case for fairness of trust management. Electron. Notes Theoret. Comput. Sci. 197(2), 73–89 (2008)MathSciNet Wierzbicki, A.: The case for fairness of trust management. Electron. Notes Theoret. Comput. Sci. 197(2), 73–89 (2008)MathSciNet
12.
Zurück zum Zitat Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the modelling of kerberos protocol in the quality of protection modelling language (QoP-ML). Ann. UMCS Inf. AI XII 4, 69–81 (2012) Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the modelling of kerberos protocol in the quality of protection modelling language (QoP-ML). Ann. UMCS Inf. AI XII 4, 69–81 (2012)
13.
Zurück zum Zitat Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the efficiency modelling of cryptographic protocols by means of the quality of protection modelling language (QoP-ML). In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 261–270. Springer, Heidelberg (2013) Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the efficiency modelling of cryptographic protocols by means of the quality of protection modelling language (QoP-ML). In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 261–270. Springer, Heidelberg (2013)
14.
Zurück zum Zitat Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Comput. Secur. 26, 1873–1883 (2003) Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Comput. Secur. 26, 1873–1883 (2003)
15.
Zurück zum Zitat Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. Ph.D. dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden (2005) Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. Ph.D. dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden (2005)
16.
Zurück zum Zitat Ong, C.S., Nahrstedt, K., Yuan, W.: Quality of protection for mobile applications. In: IEEE International Conference on Multimedia & Expo 2003, pp. 137–140 (2003) Ong, C.S., Nahrstedt, K., Yuan, W.: Quality of protection for mobile applications. In: IEEE International Conference on Multimedia & Expo 2003, pp. 137–140 (2003)
17.
Zurück zum Zitat Schneck, P., Schwan, K.: Authenticast: An Adaptive Protocol for High-Performance, Secure Network Applications. Technical report GIT-CC-97-22 (1997) Schneck, P., Schwan, K.: Authenticast: An Adaptive Protocol for High-Performance, Secure Network Applications. Technical report GIT-CC-97-22 (1997)
18.
Zurück zum Zitat Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Comput. Secur. 26, 246–255 (2007) Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Comput. Secur. 26, 246–255 (2007)
19.
Zurück zum Zitat Luo, A., Lin, C., Wang, K., Lei, L., Liu, C.: Quality of protection analysis and performance modelling in IP multimedia subsystem. Comput. Commun. 32, 1336–1345 (2009) Luo, A., Lin, C., Wang, K., Lei, L., Liu, C.: Quality of protection analysis and performance modelling in IP multimedia subsystem. Comput. Commun. 32, 1336–1345 (2009)
20.
Zurück zum Zitat LeMay, E., Unkenholz, W., Parks, D.: Adversary-driven state-based system security evaluation. In: Workshop on Security Metrics, MetriSec (2010) LeMay, E., Unkenholz, W., Parks, D.: Adversary-driven state-based system security evaluation. In: Workshop on Security Metrics, MetriSec (2010)
21.
Zurück zum Zitat Petriu, D.C., Woodside, C.M., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R., Bieman, J.M., Houmb, S.H., Jürjens, J.: Performance analysis of security aspects in UML models. In: Sixth International Workshop on Software and Performance, Buenos Aires, Argentina, ACM (2007) Petriu, D.C., Woodside, C.M., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R., Bieman, J.M., Houmb, S.H., Jürjens, J.: Performance analysis of security aspects in UML models. In: Sixth International Workshop on Software and Performance, Buenos Aires, Argentina, ACM (2007)
22.
Zurück zum Zitat Jürjens, J.: Secure System Development with UML. Springer, Heidelberg (2007) Jürjens, J.: Secure System Development with UML. Springer, Heidelberg (2007)
23.
Zurück zum Zitat Ksiezopolski, B.: QoP-ML: quality of protection modelling language for cryptographic protocols. Comput. Secur. 31(4), 569–596 (2012) Ksiezopolski, B.: QoP-ML: quality of protection modelling language for cryptographic protocols. Comput. Secur. 31(4), 569–596 (2012)
24.
Zurück zum Zitat Mazur, K., Ksiezopolski, B., Kotulski, Z.: The robust measurement method for security metrics generation. Comput. J. (2014) (in press) Mazur, K., Ksiezopolski, B., Kotulski, Z.: The robust measurement method for security metrics generation. Comput. J. (2014) (in press)
25.
Zurück zum Zitat Ksiezopolski, B., Zurek, T., Mokkas, M.: Quality of protection evaluation of security mechanisms. Sci. World J. 2014, Art. ID 725279 (2014) Ksiezopolski, B., Zurek, T., Mokkas, M.: Quality of protection evaluation of security mechanisms. Sci. World J. 2014, Art. ID 725279 (2014)
26.
Zurück zum Zitat ISO: ISO/IEC 25010: Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - System and Software Quality Models (2011) ISO: ISO/IEC 25010: Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - System and Software Quality Models (2011)
28.
Zurück zum Zitat Mazur, K., Ksiezopolski, B.: Comparison and assessment of security modeling approaches in terms of the QoP-ML. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 178–192. Springer, Heidelberg (2014) CrossRef Mazur, K., Ksiezopolski, B.: Comparison and assessment of security modeling approaches in terms of the QoP-ML. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 178–192. Springer, Heidelberg (2014) CrossRef
Metadaten
Titel
On the Balancing Security Against Performance in Database Systems
verfasst von
Damian Rusinek
Bogdan Ksiezopolski
Adam Wierzbicki
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19419-6_10

Premium Partner