“…Our approach to the tradeoff is to adjust the security parameters, such as key length and encrypting percentage, which are much easier to control. The major distinction between our approach and existing approaches (Lie & Satyanarayanan, 2007;Yurcik, Woolam, Hellings, Khan, & Thuraisingham, 2007;Lu, Lu, Abdelzaher, Stankovic, & Son, 2006;Kang & Son, 2006;Son, Zimmerman, & Hansson, 2000;Spyropoulou, Levin, & Irvine, 2000;Yau, Yan, & Huang, 2007) is that our approach can achieve the best tradeoff by minimizing a tradeoff objective function developed from service performance and security metrics, instead of intuitively trying all possible combinations of security parameters and monitoring the resulting performance and security until the desirable tradeoff is reached. Hence, our approach can achieve the best tradeoff fast and does not need to change security parameters frequently.…”