Visible to the public Assessing Run-time Overhead of Securing KeplerConflict Detection Enabled

TitleAssessing Run-time Overhead of Securing Kepler
Publication TypeConference Proceedings
Year of Publication2016
AuthorsKim, Donghoon, Vouk, Mladen A.
Conference NameThe International Conference on Computational Science, ICCS 2016
Date Published2016
Conference LocationSan Diego, CA

We have developed a model for securing data-flow based application chains. We have imple- mented the model in the form of an add-on package for the scientific workflow system called Kepler. Our Security Analysis Package (SAP) leverages Kepler's Provenance Recorder (PR). SAP secures data flows from external input-based attacks, from access to unauthorized exter- nal sites, and from data integrity issues. It is not a surprise that cost of real-time security is a certain amount of run-time overhead. About half of the overhead appears to come from the use of the Kepler PR and the other half from security function added by SAP.

Citation Keynode-38140
Refereed DesignationRefereed