skip to main content
10.1145/2674005.2674991acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

The Cost of the "S" in HTTPS

Published: 02 December 2014 Publication History

Abstract

Increased user concern over security and privacy on the Internet has led to widespread adoption of HTTPS, the secure version of HTTP. HTTPS authenticates the communicating end points and provides confidentiality for the ensuing communication. However, as with any security solution, it does not come for free. HTTPS may introduce overhead in terms of infrastructure costs, communication latency, data usage, and energy consumption. Moreover, given the opaqueness of the encrypted communication, any in-network value added services requiring visibility into application layer content, such as caches and virus scanners, become ineffective.
This paper attempts to shed some light on these costs. First, taking advantage of datasets collected from large ISPs, we examine the accelerating adoption of HTTPS over the last three years. Second, we quantify the direct and indirect costs of this evolution. Our results show that, indeed, security does not come for free. This work thus aims to stimulate discussion on technologies that can mitigate the costs of HTTPS while still protecting the user's privacy.

References

[1]
The Transport Layer Security (TLS) Protocol | RFC 5246.
[2]
G. Apostolopoulos, V. Peris, and D. Saha. Transport layer security: How Much Does It Really Cost? In INFOCOM 1999.
[3]
C. Castelluccia. Improving Secure Server Performance by Rebalancing SSL/TLS Handshakes. In USENIX Security Symposium, 2005.
[4]
C. Coarfa, P. Druschel, and D. S. Wallach. Performance Analysis of TLS Web Servers. ACM Trans. Comput. Syst., 24(1):39--69, Feb. 2006.
[5]
Y. El-khatib, G. Tyson, and M. Welzl. Can SPDY Really Make the Web Faster? In IFIP Networking 2014.
[6]
J. Erman, V. Gopalakrishnan, R. Jana, and K. K. Ramakrishnan. Towards a SPDY'Ier Mobile Web? In CoNEXT '13.
[7]
A. Finamore, M. Mellia, M. Meo, M. M. Munafo, and D. Rossi. Experiences of Internet Traffic Monitoring with Tstat. IEEE Network, 25(3), 2011.
[8]
P. Guy. Not as SPDY as You Thought. http://goo.gl/RQkTwx, June 2012.
[9]
HTTPBis Working Group. Explicit Trusted Proxy in HTTP/2.0. http://goo.gl/BUxQ22, February 2014.
[10]
IETF HTTPbis Working Group. Http/2. http://http2.github.io/.
[11]
S. Ihm and V. S. Pai. Towards Understanding Modern Web Traffic. In IMC 2011.
[12]
K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL Acceleration with Commodity Processors. In NSDI 2011.
[13]
S. Renfro. Secure browsing by default. http://goo.gl/B7U3jv, July 2013.
[14]
The Chromium Projects. Spdy. http://www.chromium.org/spdy.
[15]
X. S. Wang, A. Balasubramanian, A. Krishnamurthy, and D. Wetherall. Demystifying Page Load Performance with WProf. In NSDI 2013.

Cited By

View all

Index Terms

  1. The Cost of the "S" in HTTPS

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '14: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies
    December 2014
    438 pages
    ISBN:9781450332798
    DOI:10.1145/2674005
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 December 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. http 2.0
    2. https
    3. privacy
    4. security
    5. tls
    6. web proxies

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CoNEXT '14
    Sponsor:

    Acceptance Rates

    CoNEXT '14 Paper Acceptance Rate 27 of 133 submissions, 20%;
    Overall Acceptance Rate 198 of 789 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)166
    • Downloads (Last 6 weeks)24
    Reflects downloads up to 17 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media