ABSTRACT
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in those systems. The model is multi-constraints and utility-based, and takes into account computing resources, the perceived risk level, and user preferences. We illustrate through a case study of a typical Beyond 3G adaptive multimedia streaming service how the model may be applied to find the right balance between different QoS and security dimensions.
- M. Alia, V. Eide, N. Paspallis, F. Eliassen, S. Hallsteinsen, and G. Papadopoulos. A Utility-Based Adaptivity Model for Mobile Applications. In International Conference on Advanced Information Networking and Applications (AINA) Workshops, 2007. Google ScholarDigital Library
- M. Alia, G. Horn, F. Eliassen, M. U. Khan, R. Fricke, and R. Reichle. A Component-based Planning Framework for Adaptive Systems. In International Symposium on Distributed Objects and Applications (DOA), 2006. Google ScholarDigital Library
- M. Alia and M. Lacoste. A QoS and Security Adaptation Model for Autonomic Pervasive Systems. In International COMPSAC Workshop on Secure Software Engineering (IWSSE), 2008. Google ScholarDigital Library
- S. Amundsen, K. Lund, C. Griwodz, and P. Halvorsen. QoS-Aware Mobile Middleware for Video Streaming. In EUROMICRO Conference on Software Engineering and Advanced Applications, 2005. Google ScholarDigital Library
- S. Bowers, L. Delcambre, D. Maier, C. Cowan, P. Wagle, D. McNamee, A.-F. Le Meur, and H. Hinton. Applying Adaptation Spaces to Support Quality of Service and Survivability. In DARPA Information Survivability Conference and Exposition (DISCEX), 2000.Google Scholar
- E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J.-B. Stefani. The Fractal Component Model and its Support in Java. Software - Practice and Experience (SP&E), 36(11-12):1257--1284, 2006. Google ScholarDigital Library
- Y. Chen, C. D. Jensen, E. Gray, V. Cahill, and J.-M. Seigneur. A General Risk Assessment of Security in Pervasive Computing, 2003.Google Scholar
- D. Chess, C. Palmer, and S. White. Security in an Autonomic Computing Environment. IBM Systems Journal, 42(1):107--118, 2003. Google ScholarDigital Library
- E. Dashofy, A. van der Hoek, and R. Taylor. Towards Architecture-Based Self-Healing Systems. In Workshop on Self-healing Systems (WOSS), 2002. Google ScholarDigital Library
- C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards Measuring Anonymity. In Privacy Enhancing Technologies Workshop (PET), 2002. Google ScholarDigital Library
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In USENIX Security Symposium, 2004. Google ScholarDigital Library
- V. Eide, F. Eliassen, and J. Michaelsen. Exploiting Content-Based Networking for Fine Granularity Multi-Receiver Video Streaming. In Annual Conference on Multimedia Computing and Networking (MMCN), 2005.Google Scholar
- S. Eriksén, C. Eliasson, M. Fiedler, S. Chevul, and A. Ekelin. Mapping Service Quality - Measuring and Comparing Quality of Experience and Quality of Service for Internet-Based Map Services. In 30th Information Systems Research Seminar in Scandinavia (IRIS30), Tampere, Finland, 2007.Google Scholar
- J. Floch, S. Hallsteinsen, E. Stav, F. Eliassen, K. Lund, and E. Gjørven. Using Architecture Models for Runtime Adaptability. IEEE Software, 23(2):62--70, 2006. Google ScholarDigital Library
- A. Ganek and T. Corbi. The Dawning of the Autonomic Computing Era. IBM Systems Journal, 42(1):5--18, 2003. Google ScholarDigital Library
- D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste. Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure. IEEE Computer, 37(10):46--54, 2004. Google ScholarDigital Library
- C. Hager. Context Aware and Adaptive Security for Wireless Networks. PhD thesis, Virginia Polytechnic Institute and State University, 2004.Google Scholar
- R. He, M. Lacoste, and J. Leneutre. A Policy Management Framework for Self-Protection of Pervasive Systems. In International Conference on Autonomic and Autonomous Systems (ICAS), 2010. Google ScholarDigital Library
- K.-D. Kang and S. Son. Towards Security and QoS Optimization in Real-Time Embedded Systems. ACM SIGBED Review, 3(1):29--34, 2006. Google ScholarDigital Library
- K. Khan and J. Han. Deriving Systems Level Security Properties of Component-Based Composite Systems. In Australian Software Engineering Conference (ASWEC), 2005. Google ScholarDigital Library
- A. Kim, J. Luo, and M. Kang. Security Ontology for Annotating Resources. In International Conference on Ontologies, Databases, and Application of Semantics (ODBASE), 2005. Google ScholarDigital Library
- M. Lacoste, T. Jarboui, and R. He. A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications, 64(1-2):121--146, 2008.Google Scholar
- M. Lacoste, G. Privat, and F. Ramparany. Evaluating Confidence in Context for Context-Aware Security. In European Conference on Ambient Intelligence (AmI), 2007. Google ScholarDigital Library
- M. Reiter and A. Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security (TISSEC), 1(1), 1998. Google ScholarDigital Library
- H. Ma, I.-L. Yen, J. Zhou, and K. Cooper. QoS Analysis for Component-Based Embedded Software: Model and Methodology. Journal of Systems Software, 79(6):859--870, 2006. Google ScholarDigital Library
- D. McCullough. Noninterference and the Composability of Security Properties. In IEEE Symposium on Security and Privacy, 1988.Google Scholar
- F. Mendoza et al. Design of an Enhanced PKI for Ubiquitous Networks. In International Workshop on Secure Ubiquitous Networks (SUN), 2005.Google Scholar
- L. Mengual, J. Bobadilla, R. Caballero, and G. Hernandez. Design and Testing of Two Secure Video Conferencing Applications Based on JMF (Java Media Framework) and VIC (Video Conferencing Tool). In International Conference on Digital Telecommunications (ICDT), 2006. Google ScholarDigital Library
- A. Sabelfeld, editor. Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI), 2004. In conjunction with Workshop on Foundations on Computer Security (FCS).Google Scholar
- A. Serjantov and G. Danezis. Towards an Information Theoretic Metric for Anonymity. In Privacy Enhancing Technologies Workshop (PET), 2002. Google ScholarDigital Library
- A. Serjantov, R. Dingledine, and P. Syverson. From a Trickle to a Flood: Active Attacks on Several Mix Types. In Information Hiding Workshop (IH), 2002. Google ScholarDigital Library
- E. Spyropoulou, T. Levin, and C. Irvine. Calculating Costs for Quality of Security Service. In Annual Computer Security Applications Conference (ACSAC), 2000. Google ScholarDigital Library
- VoIP Security Alliance (VoIPSA). VoIP Security and Privacy Threat Taxonomy. http://www.voipsa.org/, 2005.Google Scholar
- S. S. Yau, Y. Yin, and H. G. An. An Adaptive Model for Tradeoff between Service Performance and Security in Service-based Environments. In International Conference on Web Services (ICWS), 2009. Google ScholarDigital Library
Index Terms
Putting together QoS and security in autonomic pervasive systems
Recommendations
Toward autonomic pervasive computing
iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & ServicesThe Autonomic Pervasive Computing can simplify the complexity of the configuration, maintenance and management of pervasive environments such as smart spaces. The Pervasive Computing is a paradigm where the information processes are distributed in the ...
Self-healing for autonomic pervasive computing
SAC '07: Proceedings of the 2007 ACM symposium on Applied computingSelf-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection and recovery are the main steps of self-healing. Due to the characteristics of pervasive computing the self-healing becomes difficult. In this paper, ...
Video multicasting in an autonomic future internet with essentially-perfect throughput and QoS guarantees
NEW2AN'11/ruSMART'11: Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networkingA framework for an Autonomic Future Internet which supports 2 services classes, the Essentially-Perfect QoS (QoS) class and the Best-Effort (BE) class, is proposed. All provisioned traffic flows in the QoS class can achieve 100% throughput and ...
Comments