A quantitative study of Public Key Infrastructures
Public Key Infrastructures have not reached the widespread diffusion expected of them, although they are well understood from a security point of view, because, like many say, the killer application has not been found yet. The lack of a clear understanding of the performance of these systems also co...
Gespeichert in:
Veröffentlicht in: | Computers & security 2003, Vol.22 (1), p.56-67 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 67 |
---|---|
container_issue | 1 |
container_start_page | 56 |
container_title | Computers & security |
container_volume | 22 |
creator | Bruschi, D Curti, A Rosti, E |
description | Public Key Infrastructures have not reached the widespread diffusion expected of them, although they are well understood from a security point of view, because, like many say, the killer application has not been found yet. The lack of a clear understanding of the performance of these systems also contributes significantly to their limited diffusion. Studies have appeared of specific aspects of the operations of PKIs, but no complete studies of the overall system are known.
In this paper we present an evaluation study of X.509-compliant Public Key Infrastructures using queuing network models. We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their number. We also investigate the impact on the performance of the system of some implementation choices such as revocation mechanisms and auditing activities. The main result of our analysis is that the system we consider, given the current state of technology, can guarantee acceptable response time in steady state even in the presence of PKI with a consistent number of users. However, in order to guarantee such a performance level, throughput must not exceed 3.5 requests per second, where a request can be a certificate generation or revocation request. Such a limitation hinders the deployment of PKIs with large numbers of users, since recovering after a system compromise may require an unacceptable amount of time. |
doi_str_mv | 10.1016/S0167-4048(03)00113-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_27930135</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404803001135</els_id><sourcerecordid>303951961</sourcerecordid><originalsourceid>FETCH-LOGICAL-c365t-98ab1df3eeb012caebed612b5770ea7ddd09b2678558b875e71868ce3e33c54e3</originalsourceid><addsrcrecordid>eNqFkMtKAzEUhoMoWKuPIAwuRBejuTSTzEpK8VIsKKjrkEnOQMp0ps2l0Ld3phUXbtycs_n-n3M-hC4JviOYFPcf_RD5BE_kDWa3GBPCcn6ERkQKmhcUy2M0-kVO0VkIyx4ShZQjRKfZJuk2uqij20IWYrK7rKuz91Q1zmSvsMvmbe11iD6ZmDyEc3RS6ybAxc8eo6-nx8_ZS754e57PpovcsILHvJS6IrZmABUm1GiowBaEVlwIDFpYa3FZ0UJIzmUlBQdBZCENMGDM8AmwMbo-9K59t0kQolq5YKBpdAtdCoqKkmHCeA9e_QGXXfJtf5uiWLBSSjJA_AAZ34XgoVZr71ba7xTBatCo9hrV4EhhpvYa1ZB7OOSgf3XrwKtgHLQGrPNgorKd-6fhG-2yeMY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207398815</pqid></control><display><type>article</type><title>A quantitative study of Public Key Infrastructures</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Bruschi, D ; Curti, A ; Rosti, E</creator><creatorcontrib>Bruschi, D ; Curti, A ; Rosti, E</creatorcontrib><description>Public Key Infrastructures have not reached the widespread diffusion expected of them, although they are well understood from a security point of view, because, like many say, the killer application has not been found yet. The lack of a clear understanding of the performance of these systems also contributes significantly to their limited diffusion. Studies have appeared of specific aspects of the operations of PKIs, but no complete studies of the overall system are known.
In this paper we present an evaluation study of X.509-compliant Public Key Infrastructures using queuing network models. We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their number. We also investigate the impact on the performance of the system of some implementation choices such as revocation mechanisms and auditing activities. The main result of our analysis is that the system we consider, given the current state of technology, can guarantee acceptable response time in steady state even in the presence of PKI with a consistent number of users. However, in order to guarantee such a performance level, throughput must not exceed 3.5 requests per second, where a request can be a certificate generation or revocation request. Such a limitation hinders the deployment of PKIs with large numbers of users, since recovering after a system compromise may require an unacceptable amount of time.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/S0167-4048(03)00113-5</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Computer networks ; Public Key Infrastructure ; Queuing ; Studies</subject><ispartof>Computers & security, 2003, Vol.22 (1), p.56-67</ispartof><rights>2003 Elsevier Science Ltd</rights><rights>Copyright Elsevier Sequoia S.A. 2003</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c365t-98ab1df3eeb012caebed612b5770ea7ddd09b2678558b875e71868ce3e33c54e3</citedby><cites>FETCH-LOGICAL-c365t-98ab1df3eeb012caebed612b5770ea7ddd09b2678558b875e71868ce3e33c54e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404803001135$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,4010,27900,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Bruschi, D</creatorcontrib><creatorcontrib>Curti, A</creatorcontrib><creatorcontrib>Rosti, E</creatorcontrib><title>A quantitative study of Public Key Infrastructures</title><title>Computers & security</title><description>Public Key Infrastructures have not reached the widespread diffusion expected of them, although they are well understood from a security point of view, because, like many say, the killer application has not been found yet. The lack of a clear understanding of the performance of these systems also contributes significantly to their limited diffusion. Studies have appeared of specific aspects of the operations of PKIs, but no complete studies of the overall system are known.
In this paper we present an evaluation study of X.509-compliant Public Key Infrastructures using queuing network models. We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their number. We also investigate the impact on the performance of the system of some implementation choices such as revocation mechanisms and auditing activities. The main result of our analysis is that the system we consider, given the current state of technology, can guarantee acceptable response time in steady state even in the presence of PKI with a consistent number of users. However, in order to guarantee such a performance level, throughput must not exceed 3.5 requests per second, where a request can be a certificate generation or revocation request. Such a limitation hinders the deployment of PKIs with large numbers of users, since recovering after a system compromise may require an unacceptable amount of time.</description><subject>Computer networks</subject><subject>Public Key Infrastructure</subject><subject>Queuing</subject><subject>Studies</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2003</creationdate><recordtype>article</recordtype><recordid>eNqFkMtKAzEUhoMoWKuPIAwuRBejuTSTzEpK8VIsKKjrkEnOQMp0ps2l0Ld3phUXbtycs_n-n3M-hC4JviOYFPcf_RD5BE_kDWa3GBPCcn6ERkQKmhcUy2M0-kVO0VkIyx4ShZQjRKfZJuk2uqij20IWYrK7rKuz91Q1zmSvsMvmbe11iD6ZmDyEc3RS6ybAxc8eo6-nx8_ZS754e57PpovcsILHvJS6IrZmABUm1GiowBaEVlwIDFpYa3FZ0UJIzmUlBQdBZCENMGDM8AmwMbo-9K59t0kQolq5YKBpdAtdCoqKkmHCeA9e_QGXXfJtf5uiWLBSSjJA_AAZ34XgoVZr71ba7xTBatCo9hrV4EhhpvYa1ZB7OOSgf3XrwKtgHLQGrPNgorKd-6fhG-2yeMY</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Bruschi, D</creator><creator>Curti, A</creator><creator>Rosti, E</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2003</creationdate><title>A quantitative study of Public Key Infrastructures</title><author>Bruschi, D ; Curti, A ; Rosti, E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c365t-98ab1df3eeb012caebed612b5770ea7ddd09b2678558b875e71868ce3e33c54e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Computer networks</topic><topic>Public Key Infrastructure</topic><topic>Queuing</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bruschi, D</creatorcontrib><creatorcontrib>Curti, A</creatorcontrib><creatorcontrib>Rosti, E</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bruschi, D</au><au>Curti, A</au><au>Rosti, E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A quantitative study of Public Key Infrastructures</atitle><jtitle>Computers & security</jtitle><date>2003</date><risdate>2003</risdate><volume>22</volume><issue>1</issue><spage>56</spage><epage>67</epage><pages>56-67</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Public Key Infrastructures have not reached the widespread diffusion expected of them, although they are well understood from a security point of view, because, like many say, the killer application has not been found yet. The lack of a clear understanding of the performance of these systems also contributes significantly to their limited diffusion. Studies have appeared of specific aspects of the operations of PKIs, but no complete studies of the overall system are known.
In this paper we present an evaluation study of X.509-compliant Public Key Infrastructures using queuing network models. We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their number. We also investigate the impact on the performance of the system of some implementation choices such as revocation mechanisms and auditing activities. The main result of our analysis is that the system we consider, given the current state of technology, can guarantee acceptable response time in steady state even in the presence of PKI with a consistent number of users. However, in order to guarantee such a performance level, throughput must not exceed 3.5 requests per second, where a request can be a certificate generation or revocation request. Such a limitation hinders the deployment of PKIs with large numbers of users, since recovering after a system compromise may require an unacceptable amount of time.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/S0167-4048(03)00113-5</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2003, Vol.22 (1), p.56-67 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_miscellaneous_27930135 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Computer networks Public Key Infrastructure Queuing Studies |
title | A quantitative study of Public Key Infrastructures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T10%3A35%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20quantitative%20study%20of%20Public%20Key%20Infrastructures&rft.jtitle=Computers%20&%20security&rft.au=Bruschi,%20D&rft.date=2003&rft.volume=22&rft.issue=1&rft.spage=56&rft.epage=67&rft.pages=56-67&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/S0167-4048(03)00113-5&rft_dat=%3Cproquest_cross%3E303951961%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207398815&rft_id=info:pmid/&rft_els_id=S0167404803001135&rfr_iscdi=true |