Вы находитесь на странице: 1из 5

154 (IJCNS) International Journal of Computer and Network Security,

Vol. 2, No. 6, June 2010

Session Based Load Optimization Techniques to


Enhance Security & Efficiency of E-commerce
Transactions
R.K. Pateriya1, J.L. Rana2 and S.C. Shrivastava3
1
Associate Professor , Department of Information Technology,
Maulana Azad National Institute of Technology (MANIT) Bhopal, India
pateriyark@gmail.com
2
Professor , Department of Computer Science and Engineering,
Maulana Azad National Institute of Technology (MANIT) Bhopal, India
jl_rana@yahoo.co.in
3
Professor , Department of Electronics Engineering,
Maulana Azad National Institute of Technology (MANIT) Bhopal, India
scs_manit@yahoo.co.in

Abstract: Today internet based e-commerce has become a over the Internet is traditionally provided using Secure
trend and business necessity. Secure Socket layer (SSL) is the Socket Layer (SSL). It is commonly used for secure http
world standard for cyber security. A SSL session contains connections where credit card information is going to be sent along
temporally and logically related request sequences from the a network and this gives e-commerce the confidence it needs
same client. In e-commerce session integrity is a critical metric. to allow on-line banking and shopping.. SSL provides and
Overload on server can lead e-commerce applications to encrypted bi-directional data stream, data is encrypted at the
considerable revenue losses, response times may grow to sender's end and decrypted at the receiver's end. It can
unacceptable levels and as a result the server may saturate or
perform mutual authentication of both the sender and
even crash .Session based admission control techniques is able
receiver of messages and ensure message confidentiality.
to control the server load . The purpose of this paper is to review
about various session based admission control techniques to This process involves certificates that are configured on both
avoid server overload. Overload control is a critical goal so that sides the connection. Although providing these security
a system can remain operational even when the incoming capabilities does not introduce a new degree of complexity
request rate is several times greater than the system capacity in web application structure, it increases remarkably the
and this admission control mechanism based on session will computation time needed to serve a connection, due to the
maximize the number of sessions completed successfully, use of cryptographic techniques, becoming a CPU intensive
allowing e-commerce sites to increase the number of workload.
transactions completed, generating higher benefits and Two problems are typically encountered with deploying e-
optimizes performance. commerce Web sites presented in [1,2]. First is overload,
where the volume of requests for content at a site
Keywords: Admission control, Application servers, temporarily exceeds the capacity for serving them and
Overload control, Service differentiation
renders the site unusable. Second is responsiveness, where
the lack of adequate response time leads to lowered usage of
1. Introduction a site and subsequently, reduced revenues. During overload
E-Commerce is a growing phenomenon as consumers gain conditions, the service’s response times may grow to
experience and comfort with shopping on the Internet .Most unacceptable levels, and exhaustion of resources may cause
of e-commerce web sites applications are session-based. the service to behave erratically or even crash causing denial
Access to a web service occurs in the form of a session of services. For this reason, overload prevention in these
consisting of a sequence of individual requests. Placing an applications is a critical issue. Several mechanisms have
order through the web site involves further requests relating been proposed in [1,3,4] to deal with overload, such as
to selecting a product, providing shipping information, admission control, request scheduling, service
arranging payment agreement and finally receiving a differentiation, service degradation.
confirmation. So for a customer trying to place an order or a Request scheduling refers to the order in which
retailer trying to make a sale, the real measure of a web concurrent requests should be served. A well known form is
server performance is its ability to process the entire queuing theory (SRPT) that shortest remaining processing
sequence of requests needed to complete a transaction. The time first scheduling minimizes queuing time .Better
higher the number of sessions completed the higher the scheduling can always be complementary to any other
amount of revenue that is likely to be generated as discussed mechanism .Service differentiation is based on
in [3]. Sessions that are broken or delayed at some critical differentiating classes of customers so that response times of
stages, like checkout and shipping, could mean loss of preferred clients do not suffer in the presence of overload.
revenue to the web site. Security between network nodes Service degradation is based on avoiding refusing clients as
(IJCNS) International Journal of Computer and Network Security, 155
Vol. 2, No. 6, June 2010

a response to overload but reducing the service offered to control goodness discussed in [1,2]: First is the percentage
clients for example in the form on providing smaller of aborted requests, which server can determine based on the
content. client side closed connections. Aborted requests indicate that
Admission control generally requires two components the level of service is unsatisfactory. Typically, aborted
knowing the load that a particular job will generate on a requests lead to aborted sessions, and could serve as a good
system, and knowing the capacity of that system. By keeping warning sign of degrading server performance; second is a
the maximum amount of load just below the system percentage of connection refused messages sent by a server,
capacity, overload is prevented and peak throughput is
in the case of full listen queue. Refused connections are the
achieved discussed in [1,2]. The goal of overload control is
dangerous warning sign of an overloaded server and its
to prevent service performance from degrading in an
inevitable poor session performance. If both of these values
uncontrolled fashion under heavy load, it is often desirable
to shed load. are zero then it reveals that an admission control
The rest of the paper is organized as follows: mechanism uses an adequate admission control function to
Section II Overview of Session based admission control cope with current workload and traffic rate. Good admission
(SBAC) techniques. Section III presents SSL connection control strategy which minimizes a percentage of aborted
differentiation and admission control. Sections IV CPU requests and refused connections (ideally to 0) and
Utilization-Based Implementation of SBAC Mechanism. maximizes the achievable server throughput .Now in the
Section V Adaptive admission control technique. Section following sections we are going to discuss three techniques
VI Comparative study of SBAC techniques. Section VII of session based admission control and their comparative
Conclusion. study

2. Overview of SBAC Techniques 3. SSL Connection Differentiation and


The Admission control is based on reducing the amount of Admission Control
work the server accepts when it is faced with overload. For SSL connections is 7 times lower than when using normal
example, admission control on per request basis may lead to connections. Based on the SSL connection differentiation, a
a large number of broken or incomplete sessions when the session-based adaptive admission control mechanism is
system overloaded Sessions have distinguishable features implemented in [3,4] .This mechanism allows the server to
from individual requests that complicate the overload avoid throughput degradation and response time increments
control. Session-based workload gives a new interesting occurred during overload conditions. The server
angle to revisit and re-valuate the definition of web server differentiates full SSL connections from resumed SSL
performance. It proposes to measure a server throughput as connections and limits the acceptance of full SSL
a number of successfully completed sessions. The reason, for connections to the maximum number possible without
failure of admission control techniques that work on a per overloading the available resources, while it accepts all the
request basis discussed in [1,2], is because it leads to large resumed SSL connections. In this way, this admission
number of broken or incomplete sessions when the system is control mechanism maximizes the number of sessions
overloaded, hence cause revenue loss. Session integrity is a completed successfully, allowing e-commerce sites based on
critical metric in e-commerce. SSL to increase the number of transactions completed, thus
Research in admission control, can be roughly categorized generating higher benefit .
under two broad approaches presented in [3,5]: First is The SSL protocol fundamentally has two phases of
reducing the amount of work required when faced with operation SSL handshake and SSL record protocol. Two
overload, and second is differentiating classes of customers different SSL handshake types can be distinguished
so that response times of preferred clients do not suffer in discussed in [3,4 ,9]: The full SSL handshake and the
the presence of overload. This paper focuses on first resumed SSL handshake. Most of the computation time
approach by reducing amount of work for admission required when using SSL is spent during the SSL handshake
control. phase, which features the negotiation between the client and
There are two desirable, but somewhat contradictory, the server to establish a SSL connection. The full SSL
properties for an admission control mechanism: stability and handshake is negotiated when a client establishes a new SSL
responsiveness discussed in [1,2]. In case, when the server connection with the server, and requires the complete
receives an occasional burst of new traffic, while still being negotiation of the SSL handshake, including parts that need
under a manageable load, the stability, which takes into a lot of computation time to be accomplished The SSL
account some load history, is a desirable property for resumed handshake is negotiated when a client establishes a
admission control mechanism. It helps to maximize server new HTTP connection with the server but resumes an
throughput and to avoid unnecessary rejection of newly existing SSL connection, the SSL session ID is reused hence
arrived sessions. However, if a server's load during previous part of the SSL handshake negotiation can be avoided,
time intervals is consistently high, and exceeds its capacity, reducing considerably the computation time for performing
the responsiveness is very important: The admission control a resumed SSL handshake Note their is big difference
policy should be switched on as soon as possible, to control between the time to negotiate a full SSL handshake
and reject newly arriving traffic. There is a trade-off compared to the time to negotiate a resumed SSL handshake
between these two desirable properties for an admission i.e. (175 ms vs. 2 ms) given in [3,4].
control mechanism.
The following two values help to check an admission
156 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 6, June 2010

A session oriented adaptive mechanism discussed in


[3,4] performs admission control based on SSL connection Above figure are taken from [3,4] shows considerable
differentiation continuously monitors incoming secure improvement using overload control mechanism as
connections to the server, performs online measurements compared to without overload control policy and maximizes
distinguishing new SSL connections from resumed SSL number of completed session
connections and decides which incoming SSL connections
are accepted and hence maximizing the number of sessions 4. CPU Utilization Based SBAC Mechanism
successfully completed . This maximum depends on the
available processors for the server and the computational A simple implementation of session based admission
demand required by the accepted resumed connections. control is based on server CPU utilization presented in [1,2]
Following are the definition of variable used in . It measures and predicts the server utilization, rejects new
calculation taken from [3,4]] :K sampling interval (currently sessions when the server becomes critically loaded and
defined as 2 s), O(k) :defined as the number of resumed SSL sends an explicit message of rejection to the client of a
connections that arrive to the server during that interval. rejected session.
CTO: The average computation time entailed by a resumed U_ac (admission control) is threshold which establishes
SSL connection .CTN: the average computation time the critical server utilization level to switch on the
entailed by a new SSL connection . N(k): defined as the admission control policy);T1; T2; :::; Ti a sequence of time
maximum number of new SSL connections that can be intervals used for making a decision whether to admit (or to
accepted by the server during that interval without reject) new sessions during the next time interval, this
overloading. A(k): defined as the number of processors sequence is defined by the ac-interval length; F_ac is an ac-
allocated to the server. Admission control mechanism function used to evaluate the predicted utilization and
periodically calculates, at the beginning of every sampling distinguish two different values for server utilization ;
interval k maximum number of new connection allowed. U_measured(i) is a measured server utilization during;Ti{
Since resumed SSL connections have preference with the i-th ac-interval}; U_predicted( i+1) is a predicted
respect to new SSL connections all resumed SSL utilization computed using a given ac-function f_ac after ac-
connections are accepted.(O(k) · CTO) is the computation interval Ti and before a new ac-interval Ti+1 begins,.
time required by the already accepted resumed SSL U_predicted(i+1)=f_ac(i+1) (2)
connections .Hence maximum number of new connection f_ac(1)=U_ac (3)
allowed: f_ac(i+1)=(1-k)*f_ac(i)+k*U_measured(i) (4)
N(k)=(k*A(k)–O(k)*CTO)/CTN (1)
where k is a damping coefficient between 0 and 1, and it is
called ac-weight coefficient. which cover the space between
ac-stable and ac-responsive policies. A web server with an
admission control mechanism re-evaluates its admission
strategy on intervals T1; T2; :::; Ti; ::: boundaries. Web
server behavior for the next time interval Ti+1 is defined in
[1,2] in the following way :.If ( U_predicted(i+1) > U_ac)
then any new session arrived during Ti+1 will be rejected,
and web server will process only requests belonging to
already accepted sessions or if ( U_predicted(i+1) < U_ac )
then web server during Ti+1 is functioning in a usual mode:
processing requests from both new and already accepted
sessions. It is the simplest techniques but are not giving very
Figure 1. Completed sessions by the original Tomcat with satisfactory results.
different numbers of processors
5. Adaptive Admission Control Technique

Predictive admission control strategy and Hybrid


admission policies as discussed in[1,2] allow the design of a
powerful admission control mechanism which tunes and
adjusts itself for better performance across different
workload types and different traffic loads[2].
Predictive admission control strategy evaluates the
observed workload and makes its prediction for the load in
the nearest future. It consistently shows the best
performance results for different workloads and different
traffic patterns. For workloads with short average session
length, predictive strategy is the only strategy which
provides both highest server throughput in completed
Figure 2. Completed sessions with overload control with sessions and no (or, practically no) aborted sessions.
different numbers of processors
(IJCNS) International Journal of Computer and Network Security, 157
Vol. 2, No. 6, June 2010

Hybrid admission control strategy which tunes itself to be session will maximizes the number of sessions completed
more responsive or more stable on a basis of observed successfully and allow e-commerce sites to increase the number of
quality of service. It successfully combines most attractive transactions completed, therefore help in enhancing security and
features of both responsive and stable policies. It improves performance.
performance results for workloads with medium to long
average session length.
References
6. Comparative study of SBAC Techniques
[1] L. Cherkasova, P. Phaal “Session Based Admission
CPU utilization based implementation presented in [1,2] Control: a Mechanism for Improving the Performance
is the simplest implementation of session based admission of an Overloaded Web Server.” HP Laboratories Report
control but can break under certain rates and not work No. HPL-98-119, June, 1998.
properly, reason is that the decision ,whether to admit or [2] L. Cherkasova, P. Phaal, “Session-based admission
reject new sessions, is made at the boundaries of ac-intervals control: A mechanism for peak load management of
and this decision can not be changed until the next ac- commercial websites” IEEE Transactions on
interval. However, in presence of a very high load, the Computers LI (6), pp. 669–685 ,2002.
number of accepted new sessions may be much greater than [3] Jordi Guitart, David Carrera, Vicenç Beltran, Jordi
a server capacity, and it inevitably leads to aborted sessions Torres and Eduard Ayguade “Session-Based Adaptive
and poor session completion characteristics Overload Control for Secure Dynamic Web
Hybrid admission control strategy covered in [2] which Applications” In Proceeding of International conf on
tunes itself to be more responsive or more stable on a basis Parallel Processing (ICPP) , pp. 341-349, 2005.
of observed quality of service. It successfully combines most [4] Jordi Guitart , Vicenc Beltran , David Carrera , Jordi
attractive features of both ac-responsive and ac-stable Torres , Eduard Ayguade “Designing an overload
policies. It improves performance results for workloads with control strategy for secure e-commerce applications” LI
medium to long average session length. (XV), pp. 4492-4510 , 2007.
Predictive admission control strategy also covered in [2] [5] M. Harchol-Balter, B. Schroeder, N. Bansal, M.
which estimates the number of new sessions a server can Agrawal, “Size-based scheduling to improve web
accept and still guarantee processing of all the future session performance” ACM Transactions on Computer Systems
requests. This adaptive strategy evaluates the observed , XXI (II) , pp. 207–233 , 2003
workload and makes its prediction for the load in the nearest [6] D. Mosberger, T. Jin “A tool for measuring web
future. It consistently shows the best performance results for server performance” Workshop on Internet Server
different workloads and different traffic patterns. For Performance (WISP’98) in conjunction with
workloads with short average session length, predictive SIGMETRICS’98 Madison, Wisconsin, USA, pp59–
strategy is the only strategy which provides both: highest 67 , 1998 .
server throughput in completed sessions and no (or, [7] S. Elnikety, E. Nahum, J. Tracey, W. Zwaenepoel,
practically no) aborted sessions. “A method for transparent admission control and
Session-based adaptive overload control mechanism based request scheduling in e-commerce web sites” 13th
on SSL connections differentiation and admission control International Conference on World Wide Web
presented in [3,4] prioritizes resumed connections (WWW’04), New York, USA, pp. 276–286, 2004
maximize the number of sessions completed and also limits [8] B. Urgaonkar, P. Shenoy, “Cataclysm: Handling
dynamically the number of new SSL connections accepted extreme overloads in internet services” Tech. Rep.
depending on the available resources and the number of TR03-40, Department of Computer Science, University
resumed SSL connections accepted, in order to avoid server of Massachusetts, USA, December 2003
overload. [9] H. Chen, P. Mohapatra, “Overload control in QoS-
aware webservers” Elsevier journal Computer Networks
7. Conclusion XLII (I) , pp.119–133, 2003
[10] A.O. Freier, P. Karlton, C. Kocher, “The SSL
SSL is commonly used for secure http connections where Protocol.Version 3.0” November 1996. Available:
sensitive information is going to be sent along networks. SSL http://wp.netscape.com/eng/ssl3/ssl-toc.htm
session integrity is a critical metric in e-commerce.
Overload can lead e-commerce applications to considerable
revenue losses or may cause response times to grow to
R K Pateriya M.Tech & B.E. in Computer
unacceptable levels hence overload control is a critical goal. Science & Engg. and working as Associate
To meet this goal either apply predictive or hybrid overload Professor in Information Technology
control strategy based on session length which tunes itself Department of MANIT Bhopal . Total 17
for giving better performance according to different Years Teaching Experience ( PG & UG ).
workload or an alternative approach is to apply SSL
connection differentiation and admission control technique
which prioritizes resumed SSL session over new session for
overload control. These admission control mechanism based on
158 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 6, June 2010

Dr. J. L . Rana Professor & Head of


Computer Science & Engg deptt. in MANIT
Bhopal .He has received his PhD from IIT
Mumbai & M.S. from USA (Huwaii) .He has
Guided Six PhD.

Dr. S. C. Shrivastava Professor & Head of


Electronics Engg. department of MANIT
Bhopal. He has Guided three PhD , 36
M.Tech and presented nine papers in
international & twenty papers in national
conference in India.

Вам также может понравиться