Focuses on the integrity and protection of information exchanged in high-performance networked computing applications. For these applications, security procedures are often omitted in the interest of performance. Since this may not be acceptable when using public communications media, our research makes explicit and then utilizes the inherent tradeoffs in realizing performance vs. security in communications. Toward this end, we expand the notion of QoS to include the level of security that can be offered within performance and CPU resource availability constraints. To address performance and security tradeoffs in asymmetric and dynamic client-server environments, we developed Authenticast, a dynamically configurable user-level communication protocol offering variable levels of security throughout the execution. Authenticast comprises multiple heuristics to realize dynamic security levels and to decide when and how to apply dynamic security. To demonstrate this protocol, we have implemented a prototype of a high-performance privacy system. This prototype offers a novel security control abstraction with which tradeoffs in security vs. performance may be made explicit and then utilized with dynamic client-server asymmetries. Authenticast uses the "security thermostat" to enable adaptive security processing. The results demonstrate increased scalability and improved performance when adaptive security is applied to the client-server platform with varying numbers of clients and varying resource availabilities at clients.
[1]
Didier Le Gall,et al.
MPEG: a video compression standard for multimedia applications
,
1991,
CACM.
[2]
Alfred Menezes,et al.
Handbook of Applied Cryptography
,
2018
.
[3]
Karsten Schwan,et al.
On adaptive resource allocation for complex real-time applications
,
1997,
Proceedings Real-Time Systems Symposium.
[4]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[5]
Bruce Schneier,et al.
Cryptography, security, and the future
,
1999
.
[6]
Bruce Schneier.
Inside risks: Cryptography, security, and the future
,
1997,
CACM.
[7]
Hideaki Yamanaka,et al.
Meeting QOS guarantees by end-to-end QOS monitoring and adaptation
,
1996,
Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.
[8]
Frank Gadegast.
Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video
,
1998
.
[9]
Ralf Steinmetz,et al.
Resource Management in Multimedia Networked Systems
,
1994
.
[10]
Jean-François Huard,et al.
On QOS mapping in multimedia networks
,
1997,
Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97).
[11]
Iskender Agi,et al.
An empirical study of secure MPEG video transmissions
,
1996,
Proceedings of Internet Society Symposium on Network and Distributed Systems Security.