Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33
DOI:
https://doi.org/10.33795/jartel.v13i2.735Keywords:
database, MySQL, performance, query, SSLAbstract
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
References
E. Rescorla, "SSL and TLS: Design and Building Secure System." Addison Wesley Professional, USA, 2001.
M. Gargiulo, "Council Post: Data Security Threats: What You Need To Know," Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/05/16/data-security-threats-what-you-need-to-know/ (accessed Jun. 06, 2023).
"Insights from 2023 Cyberthreat Defense Report," BrightTALK. https://www.brighttalk.com/service/player/en-US/theme/default/channel/12349/webcast/583264/standalone?commid=583264&reactPlayer=true&b=38861&embedUrl=https://www.imperva.com/learn/application-security/cyber-attack/ (accessed Jun. 06, 2023).
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, 2017.
D. Wagner and B. Schneier, "Analysis of the SSL 3.0 protocol," in Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, in WOEC'96. USA: USENIX Association, Nov. 1996, p. 4.
V. Beltran, J. Guitart, D. Carrera, J. Torres, E. Ayguade, and J. Labarta, Performance Impact of Using SSL on Dynamic Web Applications. 2004.
B. Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company, 2015.
A. Hoog, "Chapter 5 - Android device, data, and app security," in Android Forensics, A. Hoog, Ed., Boston: Syngress, 2011, pp. 159–194.
C. Wolfe, "Securing Data in Transit using Two Channel Communication," Theses and Dissertations, Mar. 2018, [Online]. Available: https://scholar.afit.edu/etd/1828
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Antoni Haikal, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, Hamdani Arif
This work is licensed under a Creative Commons Attribution 4.0 International License.