{"title":"带前向保密的TLS开销对多云数据库系统分段网络的影响","authors":"Jitendra Kurmi, Suresh Prasad Kannojia","doi":"10.21203/rs.3.rs-3589550/v1","DOIUrl":null,"url":null,"abstract":"Abstract Cloud database serves flexible, affordable, and versatile database frameworks. Indeed, even the cloud database is secure with Transport Layer Security (TLS). However, the performance overhead that TLS presents while executing procedures on the five major No SQL databases: Mongo DB, Apache Cassandra DB, Amazon Dynamo DB, Redis DB, and Couch DB regarding dormancy. We proposed a Multiple Replica Database Architecture (MRD-ARC) to investigate TLS execution overhead with forward secrecy for five NoSql databases, we performed two tests mimicking average database utilization designs with TLS cipher suite ECDHE-prime256v1. We examined connection pooling, where an application involves a solitary connection for some databases activities. Then, we considered one request for each connection. An application opens a connection, executes an interaction, and quickly shuts the connection in the wake of finishing the activity based on read-only throughput, read-only response, and connection throughput. Our experimental result shows that applications that cannot persevere through tremendous overhead execution should be sent inside an appropriately portioned network instead of empowering TLS with forward secrecy. Applications utilizing TLS should utilize a connection pool instead of a connection for each request. We also compare the TLS overhead with forward secrecy in terms of latency of five databases and found that Mongo DB is the best cloud database system with less overhead.","PeriodicalId":500086,"journal":{"name":"Research Square (Research Square)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Impact of TLS Overhead with Forward Secrecy on Segmented Network for Multiple Cloud Database Systems\",\"authors\":\"Jitendra Kurmi, Suresh Prasad Kannojia\",\"doi\":\"10.21203/rs.3.rs-3589550/v1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Cloud database serves flexible, affordable, and versatile database frameworks. Indeed, even the cloud database is secure with Transport Layer Security (TLS). However, the performance overhead that TLS presents while executing procedures on the five major No SQL databases: Mongo DB, Apache Cassandra DB, Amazon Dynamo DB, Redis DB, and Couch DB regarding dormancy. We proposed a Multiple Replica Database Architecture (MRD-ARC) to investigate TLS execution overhead with forward secrecy for five NoSql databases, we performed two tests mimicking average database utilization designs with TLS cipher suite ECDHE-prime256v1. We examined connection pooling, where an application involves a solitary connection for some databases activities. Then, we considered one request for each connection. An application opens a connection, executes an interaction, and quickly shuts the connection in the wake of finishing the activity based on read-only throughput, read-only response, and connection throughput. Our experimental result shows that applications that cannot persevere through tremendous overhead execution should be sent inside an appropriately portioned network instead of empowering TLS with forward secrecy. Applications utilizing TLS should utilize a connection pool instead of a connection for each request. We also compare the TLS overhead with forward secrecy in terms of latency of five databases and found that Mongo DB is the best cloud database system with less overhead.\",\"PeriodicalId\":500086,\"journal\":{\"name\":\"Research Square (Research Square)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Research Square (Research Square)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21203/rs.3.rs-3589550/v1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research Square (Research Square)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21203/rs.3.rs-3589550/v1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
云数据库服务于灵活、经济、通用的数据库框架。实际上,即使是云数据库也可以通过传输层安全性(TLS)来保证安全。然而,TLS在五个主要的No SQL数据库上执行过程时所带来的性能开销:mongodb DB、Apache Cassandra DB、Amazon Dynamo DB、Redis DB和Couch DB。我们提出了一个多副本数据库架构(MRD-ARC)来研究5个NoSql数据库的前向保密TLS执行开销,我们使用TLS密码套件ecdhei -prime256v1进行了两次模拟平均数据库利用率设计的测试。我们研究了连接池,其中应用程序涉及一些数据库活动的单独连接。然后,我们考虑每个连接的一个请求。应用程序打开连接,执行交互,并在基于只读吞吐量、只读响应和连接吞吐量完成活动后快速关闭连接。我们的实验结果表明,不能忍受巨大开销执行的应用程序应该在适当分配的网络中发送,而不是为TLS赋予前向保密功能。使用TLS的应用程序应该为每个请求使用连接池而不是连接。在五个数据库的延迟方面,我们还比较了TLS开销和前向保密,发现mongodb是开销较小的最佳云数据库系统。
Impact of TLS Overhead with Forward Secrecy on Segmented Network for Multiple Cloud Database Systems
Abstract Cloud database serves flexible, affordable, and versatile database frameworks. Indeed, even the cloud database is secure with Transport Layer Security (TLS). However, the performance overhead that TLS presents while executing procedures on the five major No SQL databases: Mongo DB, Apache Cassandra DB, Amazon Dynamo DB, Redis DB, and Couch DB regarding dormancy. We proposed a Multiple Replica Database Architecture (MRD-ARC) to investigate TLS execution overhead with forward secrecy for five NoSql databases, we performed two tests mimicking average database utilization designs with TLS cipher suite ECDHE-prime256v1. We examined connection pooling, where an application involves a solitary connection for some databases activities. Then, we considered one request for each connection. An application opens a connection, executes an interaction, and quickly shuts the connection in the wake of finishing the activity based on read-only throughput, read-only response, and connection throughput. Our experimental result shows that applications that cannot persevere through tremendous overhead execution should be sent inside an appropriately portioned network instead of empowering TLS with forward secrecy. Applications utilizing TLS should utilize a connection pool instead of a connection for each request. We also compare the TLS overhead with forward secrecy in terms of latency of five databases and found that Mongo DB is the best cloud database system with less overhead.