End-to-End Java Security Performance Enhancements for Oracle SPARC Servers
Pages 159 - 166
Abstract
In this paper we investigate the performance of cryptographic operations, when used in Java applications. We demonstrate the advantage of using built-in hardware accelerator for cryptographic operations on SPARC servers. In particular, we demonstrate the advantage of hardware cryptographic instructions invoked via AES and SHA intrinsics, implemented in the Java Virtual Machine (JVM), over the more traditional Java Native Interface (JNI) calls. For the purpose of our study, we modified the SPECweb2005 benchmark by adding modern banking requirements, and created a new workload which we call the End-to-End Java Security (EEJS) workload. Using the workload, we compare different Java Cryptographic Service Providers (CSPs) and arrive at the conclusion that hardware cryptography has significant performance advantage for Java applications. With the EEJS workload, we also identify several enhancements applicable to the Java Secure Socket Extension (JSSE).
References
[1]
Kongetira, P. 2004. A 32-way Multithreaded SPARC Processor. In Hot Chips 16.
[2]
Spracklen, L. 2009. Sun's 3rd generation on-chip UltraSPARC security accelerator. In Hot Chips 21.
[3]
Shoaib Bin Altaf, M. and Wood, D.A. 2014. LogCA: A Performance Model for Hardware Accelerators. In Computer Architecture Letters. Volume: PP, Issue: 99 (Sep. 2014).
[4]
SPECweb2005 Release 1.20 Benchmark Design Document. https://www.spec.org/web2005/docs/designdocument.html
[5]
Trademark for the SPEC Benchmark. https://www.spec.org/spec/trademarks.html
[6]
SPEC Fair Use Rule. Academic/research usage. http://www.spec.org/fairuse.html#Academic
[7]
Apache HTTP Client. https://hc.apache.org/httpcomponents-client-ga/
[8]
Java Cryptography Architecture (JCA) Reference Guide. https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/CryptoSpec.html
[9]
Java Cryptography Architecture Oracle Providers Documentation for JDK 8. http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
[10]
Rivest, R.; Shamir, A.; Adleman, L., 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2): 120--126.
[11]
Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). October, 2012.
[12]
FIPS 180--4: Secure Hash Standard. United States National Institute of Standards and Technology (NIST). August 2015.
[13]
JDK 8 PKCS#11 Reference Guide. http://docs.oracle.com/javase/8/docs/technotes/guides/security/p11guide.html
[14]
Java Secure Socket Extension (JSSE) Reference Guide. https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html
[15]
Oracle Solaris Studio Performance Analyzer. http://www.oracle.com/technetwork/server-storage/solarisstudio/features/performance-analyzer-2292312.html
[16]
Man pages for truss. http://docs.oracle.com/cd/E23823_01/html/816--5165/truss-1.html
Index Terms
- End-to-End Java Security Performance Enhancements for Oracle SPARC Servers
Recommendations
Enhancement of e-commerce security through asymmetric key algorithm
AbstractElectronic commerce offers reduced transaction costs and much convenient mode of business to all over global consumers. This paper explains asymmetric methods which uses electronic commerce transactions and other assisted algorithms of ...
Comments
Information & Contributors
Information
Published In

March 2016
346 pages
ISBN:9781450340809
DOI:10.1145/2851553
- General Chairs:
- Alberto Avritzer,
- Alexandru Iosup,
- Program Chairs:
- Xiaoyun Zhu,
- Steffen Becker
Copyright © 2016 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 12 March 2016
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
ICPE'16
Sponsor:
ICPE'16: ACM/SPEC International Conference on Performance Engineering
March 12 - 16, 2016
Delft, The Netherlands
Acceptance Rates
ICPE '16 Paper Acceptance Rate 23 of 74 submissions, 31%;
Overall Acceptance Rate 252 of 851 submissions, 30%
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 98Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in