Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 38 - Number 1
Year of Publication: 2012
T. Mohan Raj
S. Shahul Hammed
Amala Deepan

Mohan T Raj, Shahul S Hammed and Amala Deepan. Article: Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network. International Journal of Computer Applications 38(1):32-36, January 2012. Full text available. BibTeX

	author = {T. Mohan Raj and S. Shahul Hammed and Amala Deepan},
	title = {Article: Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {38},
	number = {1},
	pages = {32-36},
	month = {January},
	note = {Full text available}


Grid is a distributed computing architecture that integrates a large number of data and computing resources into a single virtual data management system. A Computational Grid is a natural extension of the former cluster computer where large computing tasks have to be computed at distributed computing resources. A safe registration and communication is essential in Computational Grid networks. This paper reports a secure tunnelling protocol integrated frame work, which enhances the quality of Point-to-Point Tunnelling Protocol (PPTP), Layer Two Tunnelling Protocol (L2TP) and Internet Security Protocol (IPSec). The proposed model used an encryption scheme such as Data Encryption Standard (DES) algorithm. The new packet offers a secure communication in the grid network without any time delays.


  • I. Foster, C. Kesselman, and S. Tuecke, “The anatomy of the grid,enabling scalable virtual organization”, International Journal on Supercomputer Applications, vol. 15, no. 3, 2001.
  • I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, “The physiology of the grid, an open grid services architecture for distributed systems integration”, Open Grid Service Infrastructure WG, Global Grid Forum, 2002.
  • Pin Hu, Lingfen Sun and Emmanuel Ifeachor, “An Approach to Structured Knowledge Representation of Service-oriented Grids”, Proceedings of UK e-Science Programme All Hands Meeting, 2007
  • Donno F. and Ronchieri E., “The impact of grid on healthcare”, System Sciences, pp. 1-9, 2009.
  • Foster, Ian and Kesselman, Carl, “The Grid: Blueprint for a New Computing Infrastructure”, Elsevier 2nd Edn, 2004.
  • Foster, I. and C. Kesselman, “ The Grid: Blueprint for a New Computing Infrastructure”, Morgan Kaufmann publ., 1999
  • Agarwal, D.A., S.R. Sachs and W.E. Johnston, “The Reality of Collaboratories”, Computer Physics Communications, vol. 110, pp. 134-141,1998.
  • Anirban Chakrabarti, Anish Damodaran, Shubhashis Sengupta, "Grid Computing Security: A Taxonomy," IEEE Security and Privacy, vol. 6, no. 1, pp. 44-51, 2008.
  • David P. Anderson, Carl Christensen, Bruce Allen, "Designing a Runtime System for Volunteer Computing," ACM/IEEE SC 2006 Conference (SC'06), pp. 33, 2006
  • I.Foster, C. Kesselman, C. Lee, R. Lindell, K. Nahrstedt, A. Roy., “A Distributed Resource Management Architecture that Supports Advance Reservations and Co-Allocation”, Intl Workshop on Quality of Service, 1999.
  • K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, “RFC2637: Point-to-Point Tunneling Protocol”, RFC Editor, 1999.
  • D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina, “RFC2784: Generic Routing Encapsulation (GRE)”, RFC Editor, March 2000.
  • G. Dommety, “RFC2890: Key and Sequence Number Extensions to GRE”, RFC Editor, September 2000.
  • Naganand Doraswamy, Dan Harkins, “IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks”, Prentice Hall PTR, October 1999.
  • S. Kent, R. Atkinson, “RFC2406: IP Encapsulating Security Payload (ESP)”, RFC Editor, November 1998.
  • Srivaths Ravi, Anand Raghunathan, Nachiketh Potlapally, “Special session on security on SoC: Securing wireless data: system architecture challenges”, Proceedings System Synthesis, ACM Press, 2002.
  • C. Madson, N. Doraswamy, RFC2405: The ESP DES-CBC Cipher Algorithm with Explicit IV, RFC Editor, Nov 1998.
  • Rüdiger Kapitza, Michael Kirstein, Holger Schmidt, Franz J. Hauck, “FORMI: an RMI extension for adaptive applications”, ARM '05, ACM Press, November 2005.
  • Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu, “Exploration for advanced SoC design: An HMAC processor with integrated SHA-1 and MD5 algorithms”, Proceedings of ASP-DAC '04, 2004.
  • R. Buyya, M. Murshed, Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing, Concurrency and Computation: Practice and Experience (CCPE) 14 (2002) 1175-1220.