Abstract
The security of information transmitted over the computer networks is a frequently raised problem. The more information is transmitted and the more important it is, the more important security issues become. Network protocols used in the Internet and local networks were not designed to meet high security demands of current applications. Though cryptography algorithms enabled security of data transfer over insecure network protocols, they introduce additional overhead. Cryptography became important part of the security policy of Grid systems. In this paper, we perform experiments to estimate the overhead introduced by this solution. The obtained results are of great importance for the OCM-G – Grid enabled monitoring system.
This work was partly funded by the European Commission, project IST-2001-32243, CrossGrid [6]
Chapter PDF
Similar content being viewed by others
References
Baliś, B., Bubak, M., Funika, W., Szepieniec, T., Wismüller, R.: An infrastructure for grid application monitoring. In: Kranzlmüller, D., Kacsuk, P., Dongarra, J., Volkert, J. (eds.) PVM/MPI 2002. LNCS, vol. 2474, pp. 41–49. Springer, Heidelberg (2002)
Baliś, B., Bubak, M., Rza̧sa, W., Szepieniec, T., Wismüller, R.: Security in the OCMG Grid Application Monitoring System. In: Proc. of 5th International Conference on Parallel Processing and Applied Mathematics (September 2003)
Bellovin, S.: Security Problems in the TCP/IP Protocol Suite. Computer Communication Review 19(2), 32–48 (1989), http://www.research.att.com/~smb/papers/ipext.ps
Bubak, M., Funika, W., Wismüller, R.: The CrossGrid Performance Analysis Tool for Interactive Grid Applications. In: Kranzlmüller, D., Kacsuk, P., Dongarra, J., Volkert, J. (eds.) PVM/MPI 2002. LNCS, vol. 2474, pp. 50–60. Springer, Heidelberg (2002)
Bellovin, S.: Defending Against Sequence Number Attacks. RFC 1948
The CrossGrid Project, http://www.eu-crossgrid.org
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246
Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid. International Journal of Supercomputer Applications 15(3) (2001)
Globus Alliance homepage, http://www.globus.org
GGF GSI Working Group, http://www.ggf.org/security/gsi/index.htm
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996), http://www.cacr.math.uwaterloo.ca/hac/
Network Time Protocol project homepage, http://www.ntp.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baliś, B., Bubak, M., Rza̧sa, W., Szepieniec, T. (2004). Efficiency of the GSI Secured Network Transmission. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science - ICCS 2004. ICCS 2004. Lecture Notes in Computer Science, vol 3036. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24685-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-24685-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22114-2
Online ISBN: 978-3-540-24685-5
eBook Packages: Springer Book Archive