SSLSARD: A Request Distribution Technique for Distributed SSL Reverse Proxies
نویسندگان
چکیده
—Although Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) are the for transport layer security, their cryptographic operations tend to be highly CPU intensive. Web systems that support SSL/TLS often deploy several locally or globally distributed SSL reverse proxies in front of Web servers to offload SSL/TLS operations from Web servers and improve the execution performance of the SSL/TLS protocol. A particularly obvious problem is the distribution strategy of incoming requests to the SSL reverse proxies. In this paper, we propose a request distribution technique to improve the overall performance of SSL reverse proxy system. This technique is called SSL-Session-Aware Request Distribution (SSLSARD), consisting of a real-time load estimation algorithm and an SSL-session-aware request distribution algorithm. Our experimental results show that SSL session resumption is critical in improving the performance of a SSL reverse proxy system. And comparing with the clientgranularity distribution strategy of SSL_session_only, SSLSARD can deal with more concurrent requests and further increase system throughput.
منابع مشابه
SSL Splitting: Securely Serving Data from Untrusted Caches
A popular technique for reducing the bandwidth load on Web servers is to serve the content from proxies. Typically these hosts are trusted by the clients and server not to modify the data that they proxy. SSL splitting is a new technique for guaranteeing the integrity of data served from proxies without requiring changes to Web clients. Instead of relaying an insecure HTTP connection, an SSL sp...
متن کاملForwarding Requests among Reverse Proxies
Reverse proxy caching is a technology deployed by many ISPs at the border routers of their backbones to improve performance of their Web hosting services. Currently, cooperation among reverse proxies (if any) is limited to sharing each other’s cache copies. In this paper, we propose to extend the cooperation by forwarding requests among cooperating reverse proxies. Instead of fetching objects f...
متن کاملSupporting End-to-end Security across Proxies with Multiple-Channel SSL
Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate with servers. This paper introduces Multiple-Channel SSL (MC-SSL), an extension of SSL, and describes and analyzes the design of MC-SSL proxy channel protocol that enables the support for end-to-end security of client-...
متن کاملMultiple-Channel Security Architecture and its Implementation over SSL
This paper presents multiple-channel SSL (MC-SSL), an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enables applications to employ multiple channels, each with its own cipher suite and data-flow direction. Our approach also allows for several partially trusted application proxies. The main adv...
متن کاملShared-memory multiprocessors with stable performance
The shared-memory programming model is attractive to programmers of parallel computers because they are not required to control the placement and communication of application data. Unfortunately, access to data is the root cause of performance problems on distributed shared-memory multiprocessors. Severe performance degradation can occur when there are many access requests competing for service...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCM
دوره 11 شماره
صفحات -
تاریخ انتشار 2016