Advertisement

Efficiency of the GSI Secured Network Transmission

  • Bartosz Baliś
  • Marian Bubak
  • Wojciech Rza̧sa
  • Tomasz Szepieniec
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3036)

Abstract

The security of information transmitted over the computer networks is a frequently raised problem. The more information is transmitted and the more important it is, the more important security issues become. Network protocols used in the Internet and local networks were not designed to meet high security demands of current applications. Though cryptography algorithms enabled security of data transfer over insecure network protocols, they introduce additional overhead. Cryptography became important part of the security policy of Grid systems. In this paper, we perform experiments to estimate the overhead introduced by this solution. The obtained results are of great importance for the OCM-G – Grid enabled monitoring system.

Keywords

Grid security GSI application monitoring OCM-G 

References

  1. 1.
    Baliś, B., Bubak, M., Funika, W., Szepieniec, T., Wismüller, R.: An infrastructure for grid application monitoring. In: Kranzlmüller, D., Kacsuk, P., Dongarra, J., Volkert, J. (eds.) PVM/MPI 2002. LNCS, vol. 2474, pp. 41–49. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Baliś, B., Bubak, M., Rza̧sa, W., Szepieniec, T., Wismüller, R.: Security in the OCMG Grid Application Monitoring System. In: Proc. of 5th International Conference on Parallel Processing and Applied Mathematics (September 2003)Google Scholar
  3. 3.
    Bellovin, S.: Security Problems in the TCP/IP Protocol Suite. Computer Communication Review 19(2), 32–48 (1989), http://www.research.att.com/~smb/papers/ipext.ps CrossRefGoogle Scholar
  4. 4.
    Bubak, M., Funika, W., Wismüller, R.: The CrossGrid Performance Analysis Tool for Interactive Grid Applications. In: Kranzlmüller, D., Kacsuk, P., Dongarra, J., Volkert, J. (eds.) PVM/MPI 2002. LNCS, vol. 2474, pp. 50–60. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Bellovin, S.: Defending Against Sequence Number Attacks. RFC 1948Google Scholar
  6. 6.
    The CrossGrid Project, http://www.eu-crossgrid.org
  7. 7.
    Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246Google Scholar
  8. 8.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid. International Journal of Supercomputer Applications 15(3) (2001)Google Scholar
  9. 9.
    Globus Alliance homepage, http://www.globus.org
  10. 10.
  11. 11.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996), http://www.cacr.math.uwaterloo.ca/hac/ CrossRefGoogle Scholar
  12. 12.
    Network Time Protocol project homepage, http://www.ntp.org/

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Bartosz Baliś
    • 1
    • 2
  • Marian Bubak
    • 1
    • 2
  • Wojciech Rza̧sa
    • 3
  • Tomasz Szepieniec
    • 2
  1. 1.Institute of Computer ScienceAGHKrakówPoland
  2. 2.Academic Computer CenterCYFRONETKrakówPoland
  3. 3.Rzeszów University of TechnologyRzeszówPoland

Personalised recommendations