Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Dynamically Changing the Symmetric Encryption Algorithm for Improving Security and Performance during Data Transfer in Grid Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 7
Year of Publication: 2012
Authors:
N. Thenmozhi
M. Madheswaran
10.5120/8766-2687

N Thenmozhi and M Madheswaran. Article: Dynamically Changing the Symmetric Encryption Algorithm for Improving Security and Performance during Data Transfer in Grid Networks. International Journal of Computer Applications 55(7):22-27, October 2012. Full text available. BibTeX

@article{key:article,
	author = {N. Thenmozhi and M. Madheswaran},
	title = {Article: Dynamically Changing the Symmetric Encryption Algorithm for Improving Security and Performance during Data Transfer in Grid Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {7},
	pages = {22-27},
	month = {October},
	note = {Full text available}
}

Abstract

In grid design authentication, authorization and confidentiality of the communication between computers are important security requirements. Without the functionality, the integrity and confidentiality of the data processed, the grid would be at risk. There are many different tools and technologies, which are available to ensure secured grid environment. The symmetric and asymmetric encryption algorithms are commonly used algorithms in grid software to provide necessary security, even though symmetric encryption algorithm significantly will affect the network communication performance. The previous work relied on the use of encryption and decryption at the application layer has an impact on the application layer performance and in the network layer performance. In the proposed work, instead of using a single encryption algorithm different encryption algorithms were selected arbitrarily during processing of each packet. The performance has been measured through simulation studies on NS2 by simulating these algorithms on GARUDA Grid Network Topology.

References

  • Bruce Schneier, 1996. Applied Cryptography, John Wiley & Sons, Inc , Second Edition.
  • S. Corson and J. Macker, 1999. In the Routing Protocol Performance Issues and evaluation consideration, Naval Research Laboratory, Network Working Group, Copyright The Internet Society, MANET Performance Issues, pp. 1-10.
  • B. P. Van Leeuwen and M. D. Torgerson, 2002. Performance Impacts of Lower Layer Cryptographyic Methods in Mobile Wireless Ad Hoc Networks", SAND REPORT, SAND 2002-3340, Sandia National Laboratories, California.
  • IBM Corporation, 2003. Introduction to Grid Computing with Globus, International Technical Support Organization.
  • BGP - Border Gateway Protocol Conformance and Performance Testing : Sample Test Plan, 2004-XA Because Performance counts.
  • Aamer Nadeem, A Performance Comparison of Data Encryption Algorithms, IEEE 2005.
  • Marty Humphery, Mary R. Thomson, and Keith R. Jackson, 2005. Security for Grids, Proceeding of the IEEE, Vol 93, No. 3, pp. 644-650.
  • Priya Dhawan,2005. Performance Comparison: Security Design Choices, Auerbach Publications.
  • Europe-China Grid InterNetworking,2006. Deliverable D2. 1, NS2 code for Grid network simulation, The EC-GIN Consortium, Europe-China Grid InterNetworking, Survey of Grid Simulators, Network-level Analysis of Grid Applications, European Sixth Framework STREP FP6-2006-IST-045256.
  • Kannan Srinivasan, Prabal Dutta, Arsalan Tavakoli, and Philip Levis, 2006. Understanding the Causes of Packet Delivery Success and Failure in Dense Wireless Sensor Networks, Technical Report SING-06-00 (//sing. stanford. edu/pub/sing-06-00. pdf).
  • Himanshu Khurana, Radostina Koleva, Jim Basney, 2007. Performance of cryptographic protocols for High performance, High Bandwidth and High Latency Grid systems, Third IEEE International Conference on e-Science and Grid Computing 2007, pp. 431-439.
  • Phillip M. Dickens, Illino, 2007. A High Performance File Transfer Mechanism for Grid Computing, A Technical Report Number Tr-0121, CoreGRID is a Network of Excellence funded by the European Commission the Sixth Framework Programme, Project no. 004265.
  • D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, 2009. Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA, Volume 8, ISSN: 1943-7765, pp. 58-64.
  • Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, 2010, Evaluating The Performance of Symmetric Encryption Algorithms, International Journal of Network Security, Vol. 10, No. 3, PP. 216-222.
  • Manghui Tu,Peng Li,I - Ling Yen, Bhavani Thurai singam, Latifur Khan, 2010. Secure Data Objects Replcation in data Grid, IEEE transaction on dependable and secure computing,Vol. 7, No. 1, pp. 50-64.
  • Thenmozhi. N, Madheswaran. M, 2010. Analysis of impact of Symmetric Encryption Algorithms in Data Security Model of Grid Networks, International Journal of Computer Science and Information Security, Vol. 8, No. 6, (September 2010).
  • EC-GIN project, http://www. ecgin. eu/corpsite/display/dsp_Entity. asp
  • ERNET project DOC Identifier : EU-IndiaGrid- Deliverable D3. 1, 2007, http://www. eis. ernet. in/aboutus. htm, partnerlisting, Indian Network Perspectives – a article presented by Meharban Singh, ERNET India.
  • GARUDA Project , www. garudaindia. in/html/garuda_publications. aspx, /applications. aspx, /network_fabric. aspx
  • Europe India Grid Project, http://partners. euindiagrid. eu/deliverables/D3. 1. html
  • Subrata Chattopadhyay, CDAC knowledge part , Banglore, India, 2007, Challenges of Garuda : The national Grid Computing Initiative of India, and http://www. cdac. in/html/pdf/FINAL English Annual Report 2010-11. pdf