We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

by T. Mohan Raj, S. Shahul Hammed, Amala Deepan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Number 1
Year of Publication: 2012
Authors: T. Mohan Raj, S. Shahul Hammed, Amala Deepan
10.5120/4654-6736

T. Mohan Raj, S. Shahul Hammed, Amala Deepan . Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network. International Journal of Computer Applications. 38, 1 ( January 2012), 32-36. DOI=10.5120/4654-6736

@article{ 10.5120/4654-6736,
author = { T. Mohan Raj, S. Shahul Hammed, Amala Deepan },
title = { Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 38 },
number = { 1 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume38/number1/4654-6736/ },
doi = { 10.5120/4654-6736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:27.164286+05:30
%A T. Mohan Raj
%A S. Shahul Hammed
%A Amala Deepan
%T Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 38
%N 1
%P 32-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Grid is a distributed computing architecture that integrates a large number of data and computing resources into a single virtual data management system. A Computational Grid is a natural extension of the former cluster computer where large computing tasks have to be computed at distributed computing resources. A safe registration and communication is essential in Computational Grid networks. This paper reports a secure tunnelling protocol integrated frame work, which enhances the quality of Point-to-Point Tunnelling Protocol (PPTP), Layer Two Tunnelling Protocol (L2TP) and Internet Security Protocol (IPSec). The proposed model used an encryption scheme such as Data Encryption Standard (DES) algorithm. The new packet offers a secure communication in the grid network without any time delays.

References
  1. I. Foster, C. Kesselman, and S. Tuecke, “The anatomy of the grid,enabling scalable virtual organization”, International Journal on Supercomputer Applications, vol. 15, no. 3, 2001.
  2. I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, “The physiology of the grid, an open grid services architecture for distributed systems integration”, Open Grid Service Infrastructure WG, Global Grid Forum, 2002.
  3. Pin Hu, Lingfen Sun and Emmanuel Ifeachor, “An Approach to Structured Knowledge Representation of Service-oriented Grids”, Proceedings of UK e-Science Programme All Hands Meeting, 2007
  4. Donno F. and Ronchieri E., “The impact of grid on healthcare”, System Sciences, pp. 1-9, 2009.
  5. Foster, Ian and Kesselman, Carl, “The Grid: Blueprint for a New Computing Infrastructure”, Elsevier 2nd Edn, 2004.
  6. Foster, I. and C. Kesselman, “ The Grid: Blueprint for a New Computing Infrastructure”, Morgan Kaufmann publ., 1999
  7. Agarwal, D.A., S.R. Sachs and W.E. Johnston, “The Reality of Collaboratories”, Computer Physics Communications, vol. 110, pp. 134-141,1998.
  8. Anirban Chakrabarti, Anish Damodaran, Shubhashis Sengupta, "Grid Computing Security: A Taxonomy," IEEE Security and Privacy, vol. 6, no. 1, pp. 44-51, 2008.
  9. David P. Anderson, Carl Christensen, Bruce Allen, "Designing a Runtime System for Volunteer Computing," ACM/IEEE SC 2006 Conference (SC'06), pp. 33, 2006
  10. I.Foster, C. Kesselman, C. Lee, R. Lindell, K. Nahrstedt, A. Roy., “A Distributed Resource Management Architecture that Supports Advance Reservations and Co-Allocation”, Intl Workshop on Quality of Service, 1999.
  11. K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, “RFC2637: Point-to-Point Tunneling Protocol”, RFC Editor, 1999.
  12. D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina, “RFC2784: Generic Routing Encapsulation (GRE)”, RFC Editor, March 2000.
  13. G. Dommety, “RFC2890: Key and Sequence Number Extensions to GRE”, RFC Editor, September 2000.
  14. Naganand Doraswamy, Dan Harkins, “IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks”, Prentice Hall PTR, October 1999.
  15. S. Kent, R. Atkinson, “RFC2406: IP Encapsulating Security Payload (ESP)”, RFC Editor, November 1998.
  16. Srivaths Ravi, Anand Raghunathan, Nachiketh Potlapally, “Special session on security on SoC: Securing wireless data: system architecture challenges”, Proceedings System Synthesis, ACM Press, 2002.
  17. C. Madson, N. Doraswamy, RFC2405: The ESP DES-CBC Cipher Algorithm with Explicit IV, RFC Editor, Nov 1998.
  18. Rüdiger Kapitza, Michael Kirstein, Holger Schmidt, Franz J. Hauck, “FORMI: an RMI extension for adaptive applications”, ARM '05, ACM Press, November 2005.
  19. Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu, “Exploration for advanced SoC design: An HMAC processor with integrated SHA-1 and MD5 algorithms”, Proceedings of ASP-DAC '04, 2004.
  20. R. Buyya, M. Murshed, Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing, Concurrency and Computation: Practice and Experience (CCPE) 14 (2002) 1175-1220.
Index Terms

Computer Science
Information Sciences

Keywords

Grid networks PPTP L2TP IPSec DES