Implementation and Evaluation of Integrity Protection Facilities for Active Grids

  • Arso Savanović
  • Dušan Gabrijelčič
  • Borka Jerman Blažič
  • Janez Bešter
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3038)


Some recent studies have shown that Grid systems can benefit from active networks technologies, thus a novel networking paradigm called Active Grid has been proposed. On the other hand, the development of appropriate security components for Grid systems is still in an early stage due to complexity and mostly academic use of Grids to date. However, security issues are exacerbated in Active Grids due to the availability of processing and caching capacity in intermediate network nodes, which adds to Grid complexity. In this paper we describe a set of facilities for protection of data integrity in Active Grids, and then present and discuss some experimental results from validation and evaluation test with the prototype implementation of these facilities.


Active Network Neighbour Discovery Security Association Active Grid Integrity Protection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Information Technology - Open Systems Interconnection - The Directory: Publickey and Attribute Certificate Frameworks. International Standard (March 2000)Google Scholar
  2. 2.
    Uniform Interface to Computing Resources. UNICORE Plus Final Report (December 2002),
  3. 3.
    Alexander, D.S., et al.: Active Network Encapsulation Protocol (ANEP). Active Network Group draft (July 1997)Google Scholar
  4. 4.
    Basu, A., Riecke, J.G.: Stability Issues in OSPF Routing. In: Proceedings of SIGCOMM 2001, August 2001, pp. 225–236 (2001)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust- Management System, Version 2. RFC 2704 (September 1999)Google Scholar
  6. 6.
    FAIN—Future Active IP Networks,
  7. 7.
    Ferrari, A., et al.: A Flexible Security System for Metacomputing Environments. Technical Report CS-98-36, University of Virginia, Charlottesville, VA 22903, USA (December 1998)Google Scholar
  8. 8.
    Grid Security Infrastructure (GSI),
  9. 9.
    Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (February 1997) (informational)Google Scholar
  10. 10.
    Krishnaswamy, S., Evans, J.B., Minden, G.J.: A Prototype Framework for Providing Hop-by-Hop Security in an Experimentaly Deployed Active Network. In: Bob, W. (ed.) Proceedings of DANCE 2002, San Francisco, USA, May 29-30, pp. 216–224. IEEE Computer Society, Los Alamitos (2002)Google Scholar
  11. 11.
    Labovitz, C., Ahuja, A., Bose, A., Jahanian, F.: Delayed Internet Routing Convergence. In: Proceedings of SIGCOMM 2000, pp. 175–187 (2000)Google Scholar
  12. 12.
    Lefèvre, L., et al.: Active Networking Support for the Grid. In: Marshall, I.W., Nettles, S.M., Wakamiya, N. (eds.) IWAN 2001. LNCS, vol. 2207, pp. 16–33. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Maimour, M., Pham, C.: An Active Reliable Multicast Framework for the Grids. In: International Conference on Computational Science, (2), pp. 588–597 (2002)Google Scholar
  14. 14.
    Martin, S., Leduc, G.: RADAR: Ring-based Adaptive Discovery of Active neighbour Routers. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol. 2546, pp. 62–73. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Mohamed, N.: Active Networks and Their Utilization in the Computational Grid. Technical Report TR03-04-01, Engineering University of Nebraska-Lincoln, Lincoln, NE 68588-0115 (April 2003)Google Scholar
  16. 16.
    Murphy, S.L., Lewis, E.T., Watson, N.M.R.: Secure Active Network Prototypes. In: Bob, W. (ed.) Proceedings of DANCE 2002, San Francisco, USA, May 29-30, pp. 166–181. IEEE Computer Society, Los Alamitos (2002)Google Scholar
  17. 17.
    Nagaratnam, N., et al.: The Security Architecture for Open Grid Services. GGF Specification (July 2002)Google Scholar
  18. 18.
    Savanović, A., Jerman Blažič, B.: A Protocol for Adaptive Autoconfiguration of Active Networks. WSEAS Transactions on Communications 2, 78–83 (2003)Google Scholar
  19. 19.
    Savanović, A., Gabrijelčič, D., Jerman Blažič, B., Karnouskos, S.: An Active Networks Security Architecture. Informatica 26(2), 211–221 (2002)zbMATHGoogle Scholar
  20. 20.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code, 2nd edn. C. John Wiley and Sons, Inc., Chichester (1996)zbMATHGoogle Scholar
  21. 21.
    Smith, J.M., et al.: Activating Networks: A Progress Report. IEEE Computer Magazine, 32–41 (April 1999)Google Scholar
  22. 22.
    Stack, T., Eide, E., Lepreau, J.: Bees: A Secure, Resource-Controlled, Java- Based Execution Environment (December 2002),
  23. 23.
    Wetherall, D., Guttag, J., Tennenhouse, D.: ANTS: Network Services Without Red Tape. IEEE Computer, 42–48 (April 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Arso Savanović
    • 1
  • Dušan Gabrijelčič
    • 1
  • Borka Jerman Blažič
    • 1
  • Janez Bešter
    • 2
  1. 1.Laboratory for Open Systems and NetworksJožef Stefan InstituteLjubljanaSlovenia
  2. 2.Laboratory for TelecommunicationsUniversity of LjubljanaLjubljanaSlovenia

Personalised recommendations