Talk Outline. Software as a Service. Software as a Service. Lecture 17: Providing Database as a Service. Professor Chen Li



Similar documents
Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases

Introduction to Decision Support, Data Warehousing, Business Intelligence, and Analytical Load Testing for all Databases

Data Management Model and Trends in NetDB2

Dell Microsoft SQL Server 2008 Fast Track Data Warehouse Performance Characterization

Executive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption

An Introduction to System Sizing for Data Warehousing Workloads

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Alliance AES Encryption for IBM i Solution Brief

Running Successful Disaster Recovery Tests

RUN BETTER SAP AG. All rights reserved. 1

SQL Server Parallel Data Warehouse: Architecture Overview. José Blakeley Database Systems Group, Microsoft Corporation

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT

SQL Server Training Course Content

Eliminate SQL Server Downtime Even for maintenance

Parallels Virtuozzo Containers

SAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013

High Availability Databases based on Oracle 10g RAC on Linux

High Availability Implementation for JD Edwards EnterpriseOne

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

<Insert Picture Here> Considerations for Enterprise Cloud Computing

ERserver. iseries. Secure Sockets Layer (SSL)

TSM (Tivoli Storage Manager) Backup and Recovery. Richard Whybrow Hertz Australia System Network Administrator

WINDOWS AZURE EXECUTION MODELS

Comparing MySQL and Postgres 9.0 Replication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Upgrading to Microsoft SQL Server 2008 R2 from Microsoft SQL Server 2008, SQL Server 2005, and SQL Server 2000

Small Materialized Aggregates: A Light Weight Index Structure für Data Warehüusing

Deployment Topologies

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Administering a Microsoft SQL Server 2000 Database

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

BM482E Introduction to Computer Security

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

DEDUPLICATION NOW AND WHERE IT S HEADING. Lauren Whitehouse Senior Analyst, Enterprise Strategy Group

Online Transaction Processing in SQL Server 2008

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Automating Data Warehouse Conceptual Schema Design and Evaluation

Xythos WebFile Server Architecture A Technical Guide to the Core Technology, Components, and Design of the Xythos WebFile Server Platform

Administering a Microsoft SQL Server 2000 Database

Redundancy Options. Presented By: Chris Williams

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

Investor Newsletter. Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE?

A Total Cost of Ownership Comparison of MongoDB & Oracle

Project Manager 1 Post == Experience years in Project Management in reputed company, Salary Rs.1,20,000/-

ORACLE DATABASE 10G ENTERPRISE EDITION

SEP Disaster Recovery and Backup Restore: Best

Backup and Recovery FAQs

Internet Services. CERN IT Department CH-1211 Genève 23 Switzerland

A Framework for Efficient Storage Security in RDBMS

ESG REPORT. Data Deduplication Diversity: Evaluating Software- vs. Hardware-Based Approaches. By Lauren Whitehouse. April, 2009

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

TapeWare THE ONE SOLUTION FOR BACKUP

Extreme Java G

Backup Strategies for Small Business

Copyright 1

WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES

All Things Oracle Database Encryption

Tushar Joshi Turtle Networks Ltd

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

IdP Clustering. You want to prevent service outages. High Availability and Load Balancing. Possible problems: HW failures

How Our Cloud Backup Solution Protects Your Network

Eloquence Training What s new in Eloquence B.08.00

Encrypted File Systems. Don Porter CSE 506

TARRANT COUNTY PURCHASING DEPARTMENT

SQL 2016 and SQL Azure

LinuxWorld Conference & Expo Server Farms and XML Web Services

Evaluation Guide. Software vs. Appliance Deduplication

Department of Technology Services UNIX SERVICE OFFERING

IBM PureData System for Transactions. Technical Deep Dive. Jonathan Rossi, PureSystems Specialist

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Database Services for CERN

ScaleArc for SQL Server

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

TOP TEN CONSIDERATIONS

Backup/Recovery Strategy and Impact on Applications. Jacek Wojcieszuk, CERN IT Database Deployment and Persistancy Workshop October, 2005

Cloud Models and Platforms

Online Backup by Mozy. Common Questions

Automatic Encryption With V7R1 Townsend Security

<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Active-Active and High Availability

Veritas Cluster Server from Symantec

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

IBM Tivoli Storage Manager for Microsoft SharePoint

Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014

Oracle MulBtenant Customer Success Stories

Designing a Microsoft SQL Server 2005 Infrastructure

Database Decisions: Performance, manageability and availability considerations in choosing a database

Database Encryption - How to Balance Security with Performance

An Oracle White Paper June Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

Looking Ahead The Path to Moving Security into the Cloud

Management of Hardware Passwords in Think PCs.

Spotlight - SQL LiteSpeed Return on Investment

Cloud Based Application Architectures using Smart Computing

Cisco Unified Contact Center Express and Cisco Unified IP IVR - Best Practices

What are the benefits of Cloud Computing for Small Business?

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Secure Database Backups with SecureZIP

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Transcription:

ICS 4B: Transaction Processing and Distributed Data Management Lecture 7: Providing Database as a Service Talk Outline Software as a Service Database as a Service NetDB System Professor Chen Li Challenges for Database as a Service User Interface Issues Performance Issues Data Privacy Issues Based on slides developed by Data Encryption in DBMSs for Data Privacy Hakan Hacigumus, Bala Iyer, and Sharad Mehrotra ICDE, San Jose, CA, USA Conclusion ICS4B Notes 7 Software as a Service Software as a Service Driving forces to paradigm shift Get what you need when you need Faster, cheaper, more accessible networks Rise of distributed architectures Virtualization in server and storage technologies Established e-business infrastructures Pay what you use Don t worry how to deploy, implement, maintain, upgrade Hardware/Software is not the largest in total cost of ownership User Operations 46% Technical Support 4% Capital Cost (HW/SW) % (Source: Gartner Group) Hardware, software, network costs have been decreasing more sharply than personnel cost ICS4B Notes 7 ICS4B Notes 7 4

Software as a Service Database as a Service - Why? Organizations need data management Already in the market as DBMSs are complex systems to deploy, setup, maintain requires highly skilled people (DBAs etc.) with high cost storage services, disaster recovery services, e-mail services, renta-spreadsheet services etc. Ease of Administration Most Significant DB Execution Problems 58% Sun ONE, Oracle Online Services, Microsoft.NET My Services etc. Qualified Administrators 57% Compatibility 5% Qualified Programmers 5% Why not Database as a Service? ICS4B Notes 7 5 Platform Independence 4% 4 5 6 7 % of respondents (Source: InfoWeek Research) ICS4B Notes 7 6 Database as a Service - Offerings NetDB - Database Service Provision Inherits all advantages of software as a service, plus Service provider allows mechanisms to create, store, access databases DB management transferred to service provider for backup, administration, restoration, space management, upgrades Developed in collaboration with University of California, Irvine and IBM Deployed on the Internet over a year ago Been used by 5 universities and more than 5 students to help teaching database classes Clients use the services providers HW, SW, personnel instead of their own Currently offered through IBM Scholars Program ICS4B Notes 7 7 ICS4B Notes 7 8

NetDB System Architecture Database as a Service - Issues Internet User HTTP Server Servlet Engine Database (Web Browser) (User Data) Warm Standby Standby System Backup/Recovery Three tier architecture Client - as thin as possible - just a browser Java based implementation Backed by fail-over solutions Allows expansions and user driven integration for application development ICS4B Notes 7 9 Issues to address: User Interface Performance Data Privacy ICS4B Notes 7 User Interface Performance ICS4B Notes 7 Simple yet powerful supports SQL queries, scripts, UDFs, stored procedures, metadata, data upload 4 Consistent Region-based composition Expansion/Integration User defined interfaces Interaction in a different medium - network Performance should -at least- match what we have already Experimented with TPC-H database and queries Performance DB vs NetDB Performance Ratio.4..8.6.4...8. Scale Factor. DB NetDB ICS4B Notes 7

myencryption{ asdas dadsasd asdd; asdas d ad ; asfsfffsddas dadsasd asdd; asdas dad asdd; asdas dadsasd asdd; asdadsasd asdd; } Data Privacy Encryption Alternatives Users give control of their data to service provider Attacks on stored data is a well known problem So, they need data security in place Implementation Level Software v.s. Hardware encryption? Security of data over the network is well studied SSL,TSL Granularity of Data Field (Attribute) level Row (Record) level (Disk) Page level ID NAME DEPTID SALARY $Sfsdf@_))#$dw?~$@<?.%*##!@<<&&=+ Fg4$$xX@<+- John White 4 Establish security for stored data even it is stolen should not make sense Encryption! iiiiiiiiiiiiiiiiiiii %&*((@sfddw?~$@<?.%d(*##!@<<&&=+ <?.%d(*##!@%&*((@ 4 %5>LWe?#@ Linda Cone <<&&=+sfddw?~$@ 9?~$<&&=+@<?.% 4 We??#@$&& Bob Drake %&*((@sfddwd(*##!@< 85 %&*((@sfddw? 5 Dadsf$&%!Aq Sarah Brown @<<&&=+~$@<? 7 ((@sfd 95 ICS4B Notes 7 ICS4B Notes 7 4 Encryption Alternatives () Encryption Alternatives () Field level encryption Row level encryption Pros: Easier to implement and integrate Flexible Allows selective encryption, reduces number of bytes to encrypt/decrypt Pros: Reduces the data size expansion problem Reduces invocation cost Better security because of total encryption Cons: Increases encryption overhead significantly due to invocation cost Data size expansion (for block cipher algorithms) Current optimization technologies do not handle foreign functions well Cons: Does not allow selective encryption, increases the number of bytes to encrypt/decrypt Implementation and integration can be hard when row functions are not supported ICS4B Notes 7 5 ICS4B Notes 7 6 4

Encryption Alternatives (4) Encryption Alternatives Experiments Page level encryption Pros: Significantly reduces encryption/decryption overhead due to reduced invocation cost Eliminates data size expansion problem (for block ciphers) Better security because of total encryption Cons: Implementation and integration is not straightforward Increases the number of bytes to encrypt/decrypt each time Higher update/delete cost, requires re-encryption of all affected pages Experimented with TPC-H database and queries Data Granularity Implementation Field Level Row Level Page Level Software Encryption V Hardware Encryption V V Encryption scheme alternatives (V: evaluated, : not evaluated) ICS4B Notes 7 7 ICS4B Notes 7 8 Software - Field Level Encryption Software - Field Level Encryption () Block Cipher Algorithm - Blowfish Implemented as foreign function (UDF) Sample insert insert into lineitem (discount) values (encrypt(,key)); Sample select select decrypt(discount,key) from lineitem where custid = ; Creator supplies the key Unauthorized person can not get hold of the key protection even from the service provider at some level User can easily implement different encryption algorithm and check that into the system different encryption algorithm/key can be used for different fields ICS4B Notes 7 9 ICS4B Notes 7 5

Software - Field Level Encryption () NetDB vs NetDB* with encryption Performance Ratio.5.5.5.5. Scale Factor NetDB TPC-H queries, except Q# * Only one field (l_discount of lineitem table) encrypted Introduced very large overhead NetDB* with encryption ICS4B Notes 7 TPC-H Query # Problem: Multiple decryption on same field select l_returnflag, l_linestatus, sum(l_quantity) as sum_qty, sum(l_extendedprice) as sum_base_price, sum(l_extendedprice * ( - l_discount)) as sum_disc_price, sum(l_extendedprice * ( - l_discount) * ( + l_tax)) as sum_charge, avg(l_quantity) as avg_qty, avg(l_extendedprice) as avg_price, avg(l_discount) as avg_disc, count(*) as count_order from tpcd.lineitem where l_shipdate <= date ('998--') - 9 day group by l_returnflag, l_linestatus order by l_returnflag, l_linestatus; ICS4B Notes 7 Query Rewrite to Improve Performance Hardware - Row Level Encryption Problem: Multiple decryption on same field (e.g., TPC-H Q#) CSE based algorithm to eliminate redundant decryptions Use temporary view Improvement due to rewrite Response Time Improvement Ratio 4.5.5.5.5. Scale Factor Specialized hardware IBM S/9 Cryptographic Coprocessor under IBM OS/9 editproc facility invoked for whole row upon read/write request, encrypt/decrypt is invoked from hardware for the row ICS4B Notes 7 ICS4B Notes 7 4 6

SW Field Level v.s. HW Row Level Query Response Time Software vs Hardware Encryption 4 44 8 ICS4B Notes 7 5 75 Number of Rows Experimented on TPC-H Q# Software Field Level: Only one field is encrypted Hardware Row Level: All fields are encrypted SW HW Hardware - Page Level Encryption Relative CPU Time 5 4 Encryption Alternatives 4. ICS4B Notes 7 6. No Row Level Page Level Encryption Page level encryption is simulated It gives significant improvement due to reduction in start-up cost Conclusion Database as a Service is a new model to alleviates the need to hire professionals purchase expensive hardware/software deal with administrative and maintenance tasks It is viable model and can emerge as a successful offering Encryption is a solution for privacy -the most important issue- Hardware encryption has a clear superiority over software Hardware makes encryption practical for databases There are trade-offs for granularity of data ICS4B Notes 7 7 7