Designing an overload control strategy for secure e-commerce applications

نویسندگان

  • Jordi Guitart
  • David Carrera
  • Vicenç Beltran
  • Jordi Torres
  • Eduard Ayguadé
چکیده

Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this paper we present a complete characterization of secure e-commerce applications scalability to determine which are the bottlenecks in their performance that must be considered for an overload control strategy. With this information, we design an adaptive session-based overload control strategy based on SSL (Secure Socket Layer) connection differentiation and admission control. The SSL connection differentiation is a key factor because the cost of establishing a new SSL connection is much greater than establishing a resumed SSL connection (it reuses an existing SSL session on the server). Considering this big difference, we have implemented an admission control algorithm that prioritizes resumed SSL connections to maximize the performance in session-based environments and dynamically limits the number of new SSL connections accepted, according to the available resources and the current number of connections in the system, in order to avoid server overload. Our evaluation on a Tomcat server demonstrates the benefit of our proposal for preventing server overload. 2007 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms

Overload control mechanisms such as admission control and connection differentiation have proven effective for preventing overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when some kind of resource management is considered in addition to these mechanisms. In this paper we propose an overload control strat...

متن کامل

Feasibility of Electronic Commerce at Cooperative in Gilan Province to Select an Appropriate E-Commerce Model by Using Fuzzy Analysis Network Process

Electronic commerce as one of the most important of Innovation aspects in the process of doing business is used by many organizations and companies in the world. Cooperatives as the main part of the country's economy have fundamental role in improving and promoting of economic. Therefore, innovation methods and tools, new processes and perform business tasks such as e-commerce will play an i...

متن کامل

Feasibility of Electronic Commerce at Cooperative in Gilan Province to Select an Appropriate E-Commerce Model by Using Fuzzy Analysis Network Process

Electronic commerce as one of the most important of Innovation aspects in the process of doing business is used by many organizations and companies in the world. Cooperatives as the main part of the country's economy have fundamental role in improving and promoting of economic. Therefore, innovation methods and tools, new processes and perform business tasks such as e-commerce will play an i...

متن کامل

Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation

With the evolution of the Internet, collaborative filtering techniques are becoming increasingly popular in E-commerce recommender systems. Such techniques recommend items to users employing similar users' preference data. People use recommender systems to cope with information overload. Although collaborative filtering systems are widely used by E-commerce sites, they fail to protect users' pr...

متن کامل

STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees

Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., secre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2007