skip to main content
10.1145/1958746.1958817acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
research-article

Engineering SSL-based systems for enhancing system performance

Published: 14 March 2011 Publication History

Abstract

Security in a distributed system often comes at the cost of a performance penalty. Due to the CPU time consuming security algorithms used, transferring data using SSL is known to be significantly slow. This paper presents an initial set of research results of a university-industry collaborative research focusing on a performance enhancement technique called security sieve that separates the classified and non-classified components in a document and sends these on a secure and a (faster) non-secure channel respectively. Experimental results presented in the paper demonstrate the effectiveness of the technique.

References

[1]
Almuhaideb, A.; Alhabeeb, M.; Le, P.D; Srinivasan, B., "Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance," 24th IEEE International Conference on Advanced Information Networking and Applications, pp.1047--1053, 20-23 April 2010.
[2]
Argyroudis, P.G.; Verma, R.; Tewari, H.; O'Mahony, D., "Performance analysis of cryptographic protocols on handheld devices," Third IEEE International Symposium on Network Computing and Applications, 2004., pp. 169--174, 30 Aug.-1 Sept. 2004.
[3]
Berbecaru, D., "On Measuring SSL-based Secure Data Transfer with Handheld Devices," 2nd International Symposium on Wireless Communication Systems, 2005., pp.409--413, 7-7 Sept. 2005.
[4]
Chou, W., "Inside SSL: the secure sockets layer protocol," IT Professional, vol.4, no.4, pp. 47--52, Jul/Aug 2002.
[5]
Cicso Systems, Inc. "White Paper: Introduction to Secure Sockets Layer," 2002.
[6]
Eastlake, D.; Jones, P., US Secure Hash Algorithm (SHA1), IETF RFC 3174, September 2001; http://www.ietf.org/rfc/rfc3174.txt.
[7]
Kant, K.; Iyer, R.; Mohapatra, P., "Architectural impact of secure socket layer on Internet servers," International Conference on Computer Design, pp.7--14, 2000.
[8]
Lazowska, E. D.; Zahorjan, J.; Graham, G. S.; Sevcik, K. C. Quantitative System Performance, Prentice Hall, 1984.
[9]
Li, Z.; Iyer, R.; Makineni, S.; Bhuyan, L., "Anatomy and Performance of SSL Processing," International Symposium on Performance Analysis of Systems and Software, 2005., pp.197--206, 20-22 March 2005.
[10]
Oracle Corporation, "All about Sockets," {Online}. Available: http://download.oracle.com/javase/tutorial/networking/sockets/ {Accessed October 16, 2010}.
[11]
Oracle Corporation, "Java Secure Socket Extension: Reference Guide," {Online}. Available: http://download.oracle.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html {Accessed Oct.16, 2010}.
[12]
Portmann, M.; Seneviratne, A., "Selective security for TLS," Networks, 2001. Ninth IEEE International Conference, pp. 216--221, 10-12 Oct. 2001.
[13]
Potlapally, N.R.; Ravi, S.; Raghunathan, A.; Lakshminarayana, G., "Optimizing public-key encryption for wireless clients," International Conference on Communications, 2002., vol.2, pp. 1050--1056.
[14]
Rivest, R. L.; Shamir, A. ; Adleman, L., "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM 21, 2 (February 1978), 120--126.
[15]
Song, Y.; Leung, V.; Beznosov, K., "Supporting End-to-end Security Across Proxies with Multiple Channel SSL," in IFIP 18th World Computer Conference (WCC'2004), Toulouse, France, 2004, pp. 32.
[16]
The SANS Technology Institute, "Security Laboratory: SSL/TLS," {Online}. Available: http://www.sans.edu /resources/securitylab/ssl_tts.php. {Accessed Jan. 7, 2011}

Cited By

View all
  • (2016)SSLSARD: A Request Distribution Technique for Distributed SSL Reverse ProxiesJournal of Communications10.12720/jcm.11.4.374-382Online publication date: 2016
  • (2012)Devising Secure Sockets Layer-based distributed systems: A performance-aware approach2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)10.1109/PCCC.2012.6407780(376-383)Online publication date: Dec-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICPE '11: Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
March 2011
470 pages
ISBN:9781450305198
DOI:10.1145/1958746
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SSL performance
  2. performance engineering of ssl
  3. performance optimization
  4. secure socket layer (ssl)
  5. security system performance.

Qualifiers

  • Research-article

Conference

ICPE'11

Acceptance Rates

Overall Acceptance Rate 252 of 851 submissions, 30%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)SSLSARD: A Request Distribution Technique for Distributed SSL Reverse ProxiesJournal of Communications10.12720/jcm.11.4.374-382Online publication date: 2016
  • (2012)Devising Secure Sockets Layer-based distributed systems: A performance-aware approach2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)10.1109/PCCC.2012.6407780(376-383)Online publication date: Dec-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media