Presentation is loading. Please wait.

Presentation is loading. Please wait.

Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.

Similar presentations


Presentation on theme: "Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding."— Presentation transcript:

1 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding in MongoDB Presented By: Anam Zahid

2 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Agenda Scaling MongoDB’s Approach Architecture Mechanism Proposed Architecture

3 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Scaling Scaling UP (Vertical Scaling) –Addition of more CPUs and Storage Capacity 64 MB

4 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Scaling Scaling OUT (Horizontal Scaling) –Distribution of data across multiple servers

5 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab MongoDB’s Approach Sharding (horizontal scalability) –A method to store data across multiple machines/shards –Supports deployments with very large datasets –Maintains high throughput operations

6 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab MongoDB’s Approach Sharding Advantages –Reduces the number of operations each shard handles –Reduces the Amount of data that each server stores –Make the Cluster invisible for Clients –Ensures Cluster availability for reads and writes –Easy scaling out

7 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Sharding Architecture

8 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Sharding with Replica Set

9 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Mechanism Shards –Master slave,Replica Sets or Mongod instances Configuration Servers –Exactly 3 for production –Contains meta-data Routing Instances –Direct interface with client application –Can be many in number –Also act as a balancer for chunk migration

10 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Mechanism Sharding on per collection basis Based on shard keys Default chunk size is 64MB

11 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Mechanism Two basic operations –Chunk Splitting –Chunk Migration

12 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Proposed Architecture Encryption/Decryption Layer Key Distribution Store

13 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Authentication Authorization Client Application Key Distribution Store Config. Server Shard A Shard B Shard C Config. Server Encryption/Decryption Engine Query Router 1 2 3 4 5 6 7 8 9 10

14 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Proposed Architecture 1. Client Application sends Login Request to authentication Module 2. Authentication Module authenticates it on the basis of certificate and sends reply back to client application 3. Client application sends query to authorization server. The Authorization server generates policies and maps user policies with user profile. Then it verifies user query against user policy. 4. In case of successful authorization, authorization server sends the query to Query Router

15 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Proposed Architecture 5. Query router get meta-data information about shards from the configuration server/s 6. It then looks for appropriate shard/s on the basis of query parameters 7. Query router sends query request to encryption/decryption Engine 8. The encryption/Decryption Engine requests key distribution store for encryption key 9. The Engine requests data from appropriate shards, decrypt it and sends the response back to query router. 10. Query router forwards this data to Client Application

16 Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab


Download ppt "Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding."

Similar presentations


Ads by Google