Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33

Authors

  • Antoni Haikal State Polytechnic of Batam
  • Heru Wijanarko State Polytechnic of Batam
  • Ocha Oktafia State Polytechnic of Batam
  • Muhammad Hikmah Husnuzon State Polytechnic of Batam
  • Gunawan Gunawan State Polytechnic of Batam
  • Hamdani Arif State Polytechnic of Batam

DOI:

https://doi.org/10.33795/jartel.v13i2.735

Keywords:

database, MySQL, performance, query, SSL

Abstract

The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.

References

E. Rescorla, "SSL and TLS: Design and Building Secure System." Addison Wesley Professional, USA, 2001.

M. Gargiulo, "Council Post: Data Security Threats: What You Need To Know," Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/05/16/data-security-threats-what-you-need-to-know/ (accessed Jun. 06, 2023).

"Insights from 2023 Cyberthreat Defense Report," BrightTALK. https://www.brighttalk.com/service/player/en-US/theme/default/channel/12349/webcast/583264/standalone?commid=583264&reactPlayer=true&b=38861&embedUrl=https://www.imperva.com/learn/application-security/cyber-attack/ (accessed Jun. 06, 2023).

B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, 2017.

D. Wagner and B. Schneier, "Analysis of the SSL 3.0 protocol," in Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, in WOEC'96. USA: USENIX Association, Nov. 1996, p. 4.

V. Beltran, J. Guitart, D. Carrera, J. Torres, E. Ayguade, and J. Labarta, Performance Impact of Using SSL on Dynamic Web Applications. 2004.

B. Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company, 2015.

A. Hoog, "Chapter 5 - Android device, data, and app security," in Android Forensics, A. Hoog, Ed., Boston: Syngress, 2011, pp. 159–194.

C. Wolfe, "Securing Data in Transit using Two Channel Communication," Theses and Dissertations, Mar. 2018, [Online]. Available: https://scholar.afit.edu/etd/1828

Downloads

Published

2023-06-18

How to Cite

[1]
A. Haikal, H. Wijanarko, O. Oktafia, M. H. Husnuzon, G. Gunawan, and H. Arif, “Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33”, Jartel, vol. 13, no. 2, pp. 135-141, Jun. 2023.