IJSRD - International Journal for Scientific Research & Development| Vol.

4, Issue 03, 2016 | ISSN (online): 2321-0613

Performance Analysis of SSL VPN: On Cloud Environment
Sneha Padhiar
ME Research Scholar
Abstract— VPN is a Proven technology that does provide
E. SSL:
Security Strong enough for business use. However,
Performance of these network is also Important. In this SSL is used with web browsers to give users a seamless
Research we evaluate Performance of Operation System Connection. It protects data using encryption and uses
available on Cloud (Windows Server 2012R2, Windows hashing to ensure Integrity [3][4].
Server 2013 trial, Windows Server 2008R2) on a test-bed set- F. Cloud Computing:
up and observe their network Performance with SSL VPN
1) Deployment Models [7][8]:
Protocol. It is found that the three Operating System give
different Performance Values. 2) Public Cloud:
Key words: VPN, SSL-VPN, throughput, Virtual machine In this cloud infrastructure is made available to a large
industry group or the general public and is owned by an
organization selling cloud services.
I. INTRODUCTION
3) Private Cloud:
A. VPN: The cloud infrastructure is operated by particular
A Virtual Private Network (VPN) is a private data network organization. It may be managed by a third party or the
which uses the public telecommunication infrastructure, it organization and may exist on premise or off premise.
maintains privacy through the use of tunneling protocol and 4) Hybrid Cloud:
security procedure [1]. Idea behind VPN is providing secure In this cloud infrastructure is a composition of clouds (public,
connection between organization and its branches via low- private, community) that remain same entities but are bound
cost lines using internet [1][2]. A VPN operates by passing together by standardized technology that enables data and
data over the internet through “Tunnels” which are secure, application portability.
encrypted virtual connections [1]-[5]. VPN uses various 5) Community Cloud:
security protocols for Tunneling they are:- The cloud infrastructure is shared by some organizations and
 Internet Protocol Security(IPSEC) supports a particular community that has shared concerns
 Layer2 Tunneling Protocol(L2TP) (e.g., security requirements, mission, compliance
consideration and policy). It may be managed by a third party
 Point to point tunneling Protocol(PPTP)
or the organization and may exist off premise or on premise.
 Secure Sockets Layer(SSL)
G. Service Models [7][8]:
B. IPSEC:
1) Software as A Service (Saas):
IPsec provides authentication of users, encryption of data and
The capability provided to the consumer is to use the
data integrity during the data transmission between senders
provider’s applications running on a cloud infrastructure2.
and receivers [2]. It uses three primary protocols which are
The applications are accessible from various client devices
Authentication Header (AH), Encapsulated Security Payload
through either a thin client interface, such as a web browser
(ESP), and Internet Key Exchange (IKE). These are used in
(e.g., web-based email), or a program interface.
establishing connection and transmitting data in secure way
2) Platform as A Service (Paas):
[2]. There are two encryption modes in which IPsec can be
The capability provided to the consumer is to deploy onto the
implemented [2]-[4].
cloud infrastructure consumer-created or acquired
 Transport Mode applications created using programming languages, libraries,
 Tunnel Mode services, and tools supported by the provider.
Transport mode encrypts only data portion (Payload) of 3) Infrastructure as A Service (Iaas):
packets. Tunnel mode is more secure which encrypts both The capability provided to the consumer is to provision
header and payload [2][3]. processing, storage, networks, and other fundamental
C. L2tp: computing resources where the consumer is able to deploy
L2TP tunneling is accomplished through multiple levels of and run arbitrary software, which can include operating
encapsulation. PPP data is encapsulated within a PPP header systems and applications.
and an L2TP header. Then L2TP packet is further The rest of paper is organized as follows: In Section
encapsulated in a UDP header. Final packet is encapsulated II Experimental finding results are given. Conclusion is
within IP header [2][3][6]. discussed in Section III. Future work are described in section
IV.
D. PPTP:
PPTP is an OSI Layer2 protocol which is an extension of II. EXPERIMENTAL FINDINGS
point-to-point protocol (PPP).It creates IP datagrams which To Evaluate the Performance of SSL-VPN on Cloud based
containing encrypted PPP packets. which are transported Operating System first the SSL-VPN has been created using
through the tunnel. By design PPTP has a very simple Cloud Infrastructure where Cloud Infrastructure as a Service
mechanism [2][3]. is Provided by Windows Azure. After Creation of SSL-VPN
using Azure portal Transmission of Data is Carried out on
Selected Operating systems.

All rights reserved by www.ijsrd.com 518
Performance Analysis of SSL VPN: On Cloud Environment
(IJSRD/Vol. 4/Issue 03/2016/140)

We Presents the findings of this Research in this
Section. Connection of VPN using Azure gateway are shown
in Fig a and Fig b. Throughput Values of Virtual Machines
Operating System :Windows Server 2008 and windows
Server 2012 R2 with different size of File are shown in Fig
c and Fig d. Graph shows that Windows Server 2012 gives
the higher throughput Values than Windows server 2008 with
different Combination of sender and receiver Operation
system.

Fig. 4: Performance comparison when 4vms are connected

III. CONCLUSION
In this research, network Performance of SSL-VPN were
tested on Different Operating Systems. In Windows Server
2012 R2 SSL shows the Highest throughput. So from the
findings it is evident that network performance of VPN tunnel
is dependent on the choice of the Operating System, VPN
Protocol, Algorithm.

IV. FUTURE WORK
Fig. 1: Secure connection to Azure Gateway This work can be extended by including new operating
systems. We can also compare the performance of normal
VPN and VPN in cloud infrastructure, so this work can be
further extended to calculate the performance of VPN in
cloud with different Operating Systems, Protocols and
algorithms with various parameters.

REFERENCES
[1] Dr. P. Rajamohan “Performance analysis and special
issues of VPN technologies in communication: Trusted
vpns, secure vpns, and hybrid vpns”,IIJCS,July 2014.
[2] Jayanthi Gokulakaeishnan, Dr. V. Thulasi Bai “a survey
report on vpn security & its technologies”, IJCSE, aug-
sep 2014
[3] Shaneel Narayan, Samad S. kolahi, Kris Brooking,
Simon De Vere, “Performance Evaluation of Virtual
Fig. 2: Two Virtual Machines Are Connected on Created Private Network Protocols in windows 2003
VPN(Padhiar-VPN) Environment” ,© 2008 IEEE.
[4] Su Hua Sun, “The advantages and the implementation of
SSL VPN”, ©2011 IEEE.
[5] Shaneel Narayan, Kris Brooking, Simon De Vere
“network performance analysis of vpn protocols:an
empirical comparison on different operating system” , ©
2009 IEEE.
[6] Dr. S. S Riaz Ahamed, P rajmohan “comprehensive
performance analysis and special issues of virtual private
network strategies in the computer communication”,
IJEST, July 2011.
[7] Rahul Bhoyar, Prof. Nitin Chopde, “Cloud Computing:
Service models, Types, Database and issues”,IJARCSSE
Volume 3, Issue 3, March 2013
[8] Zhengping Liang, SongsongJia, Jianyong Chen , Pengfu
Chen, “Security of Virtual Working on Cloud
Computing Platform” , © 2012 IEEE
Fig. 3: performance comparison by transferring data on [9] Sneha Padhiar,Pranav Verma, “A Survey on
different OS Performance Evaluation of VPN on Various Operating
Systems”, s © 2015 IJEDR

All rights reserved by www.ijsrd.com 519

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer: Get 4 months of Scribd and The New York Times for just $1.87 per week!

Master Your Semester with a Special Offer from Scribd & The New York Times