SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 460
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 1 | Issue – 6
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Enhancing the Techniques to Secure Grid Computing
Simranjeet Kaur
Jasmer Singh Jaijee Degree College Gurne Kalan, Moonak, Punjab
ABSTRACT
Security is important issue in every aspect in today’s
world if you are using the networks. Various
algorithms are there to secure your network so that
unauthorized user can’t breach into your accounts. SO
for this authentication and authorization plays an
important role but apart from these use of various
encryption algorithms are there for grid data security.
By using these algorithms you can easily secure your
network and it will also enhance the performance of
our grid networks. In this paper model has been
designed for grid security that is been implemented on
network Simulator and the performance has been
measured with the previous models. By using various
cryptographic algorithms the efficiency and the
packed delivery ratio is increased incredibly.
Keywords: Encryption Algorithms, Kerberos,
Authentication, Grid
I. INTRODUCTION
The term ‘grid’ was comes in 1990s and grid
computing is a term referring to the combination of
various computer resources from multiple
administrative domains to reach a common goal in
advanced computer science. The term 'grid
computing' suggests a network of computers in which
each computer resources are shared with every other
computer in the system. It is just an architecture that
combines computer resources from various domains
to reach a main objective. Resources like Processing
power, Memory, data storage are all resources that
helps the authorized users for specific task. The
symmetric and asymmetric encryption algorithms are
commonly used algorithms in grid software to provide
necessary security. Now Encryption is a process of
encoding the plain text into cipher text and decryption
is the processes when you got cipher text just decode
that into plain text. So decryption is just reversing that
of encryption.
Symmetric encryption is classified into 2 categories
block ciphers and stream ciphers. A stream cipher is a
symmetric key cipher where plaintext digits are
combined with a
pseudorandom cipher digit stream (keystream). In
a stream cipher, each plaintext digit is encrypted one
at a time with the corresponding digit of the
keystream, to give a digit of the ciphertext stream. A
block cipher takes a block of plain text and generates
cipher text generally of same size. Block cipher avoid
floating values in order to minimize the energy
consumption. Block cipher supports various
encryption key methods.
The choice of block size does not directly affect to the
strength of encryption scheme. The strength of cipher
depends up on the key length. The present research
work indentifies the various aspects of the enhanced
traffic model for getting command on symmetric
encryption algorithm those are used for security the
grid. By enhancing the aspects of these algorithms
various Symmetric Encryption algorithms are
proposed for better throughput so that network
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 461
performance also improves and better security among
the systems and obviously for the grid. The
encryption process uses the Feistel structure.
Feistel Structure is shown in the following
illustration −
The difficult part of designing a Feistel Cipher is
selection of round function ‘f’. In order to be
unbreakable scheme, this function needs to have
several important properties that are beyond the
scope of our discussion.
II. Encryption Algorithm
Security is based upon three main services:
authentication, authorization, and encryption. It is
needed to authenticate the grid before any requested
access or operation comes in the grid. The grid user
would be granted certain rights to access a grid
resource, once the grid resource is authenticated
within the grid. This, however, does not prevent data
in transit between grid resources from being captured
or altered.
However, in this work, the researcher examined its
impact on total network performance. In this paper,
we will study the impact of symmetric encryption
algorithms in a typical grid network. The use of
cryptography always help in one way or the other.
Therefore, it has been decided to model an application
layer encryption decryption scenario in a typical grid
computing environment and study its impact on
network performance through network simulations.
The time interval between two packets and the size of
each packet waiting for being sent out is very
important when modeling actual traffic. Therefore, if
the model can accurately match these two
characteristics, it is said to generate traffic that is
similar to the actual data.
III. Security Implementation
Kerberos: Kerberos is a network authentication
protocol. It is designed to provide strong
authentication for client/server applications by using
secret-key cryptography.
The Internet is an insecure place. Many of the
protocols used in the Internet do not provide any
security. Tools to "sniff" passwords off of the network
are in common use by malicious hackers. Thus,
applications which send an unencrypted password
over the network are extremely vulnerable. Worse yet,
other client/server applications rely on the client
program to be "honest" about the identity of the user
who is using it. Other applications rely on the client to
restrict its activities to those which it is allowed to do,
with no other enforcement by the server.
Packet vs Time
0% 50% 100%
1
2
3
4
5
Encryption
Methods
Time
Packets
0
2
4
6
8
1 2 3 4 5 6 7 8 9
Series1
Series2
Series3
Series4
Series5
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 462
Some sites attempt to use firewalls to solve their
network security problems. Unfortunately, firewalls
assume that "the bad guys" are on the outside, which
is often a very bad assumption. Most of the really
damaging incidents of computer crime are carried out
by insiders. Firewalls also have a significant
disadvantage in that they restrict how your users can
use the Internet. (After all, firewalls are simply a less
extreme example of the dictum that there is nothing
more secure than a computer which is not connected
to the network --- and powered off!) In many places,
these restrictions are simply unrealistic and
unacceptable.
Kerberos as a solution to these network security
problems. The Kerberos protocol uses strong
cryptography so that a client can prove its identity to a
server (and vice versa) across an insecure network
connection. After a client and server has used
Kerberos to prove their identity, they can also encrypt
all of their communications to assure privacy and data
integrity as they go about their business.
Symmetric Encryption: Both encryption and
decryption of data use the same secret key. Symmetric
cryptography is also known as secret key
cryptography.
Asymmetric encryption: Two different keys are used
for encrypting and decrypting the data. The public key
encryption technique is the primary example of this
using a "public key" and a "private key" pair.
Therefore, it is also referred as public key
cryptography.
Normal
Flow
Under
Attack
After
Encryption
End-to-End
Delay (ms)
18.22 35.25 19.09
Throughput
(bps)
170099.91 65072.06 143440
The comparative analysis if the grid is under attack
and after the Encryption applied on the grid.
IV. CONCLUSION
A model for grid security infrastructure has been
implemented on network simulator NS2 and the
impact of use of encryption algorithms in network
performance has been measured.
I have simulated a simplified model and simulated
various grids before attack and after the encryption
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 463
algorithm is applied to that particular grid. As shown
in the graphs the packets are increasing and the
throughput of the nodes increased incredibly after the
encryption algorithms are applied to the grid. Further,
it has been shown that, randomly and dynamically
changing the encryption algorithm during the data
transfer has a positive impact on performance. In
addition to that, random change of encryption
algorithm will certainly increase the effort needed to
break the code by any intervening hacker and hence at
least theoretically will strengthen the security. In this
simulation study, we randomly changed the
encryption algorithm just to study its impact on
network performance.
REFERENCES
1. Foster, I. (2002). ‘What is the Grid? A Three Point
Checklist’, GridToday, Vol.1, No.6.
2. Ann Chervenak, Ewa Deelman, Carl Kesselman,
Bill Allcock, Ian Foster, Veronika Nefedova,
Jason Lee, Alex Sim, Arie Shoshani, Bob Drach,
Dean Williams,Don Middleton, (2003), ‘High-
Performance Remote Access to Climate
Simulation Data: A Challenge Problem for Data
Grid Technologies’, Parallel Computing, Special
Issue : High Performance Computing with
geographical data, ACM Press, Vol.29, Issue 10,
pp.1335-1356.
3. Antonio Carzaniga, Matthew J. Rutherford,
Alexander L. Wolf, (2004), ‘A Routing Scheme
for Content-Based Networking’, IEEE conference
on Computer and Communications (INFOCOM’
04), pp.918-928.
4. Marty Humphery, Mary R. Thomson, and Keith
R.Jackson, (2005), ‘Security for Grids’,
Proceeding of the IEEE, Vol.93, No.3, pp.644-
650.
5. GARUDA Project , www. garudaindia.

Más contenido relacionado

La actualidad más candente

Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
IAEME Publication
 

La actualidad más candente (19)

Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Secry poster
Secry posterSecry poster
Secry poster
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
 

Similar a Enhancing the Techniques to Secure Grid Computing

Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 

Similar a Enhancing the Techniques to Secure Grid Computing (20)

4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
N45028390
N45028390N45028390
N45028390
 

Más de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Más de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

Último (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Enhancing the Techniques to Secure Grid Computing

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 460 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 1 | Issue – 6 International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Enhancing the Techniques to Secure Grid Computing Simranjeet Kaur Jasmer Singh Jaijee Degree College Gurne Kalan, Moonak, Punjab ABSTRACT Security is important issue in every aspect in today’s world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user can’t breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Keywords: Encryption Algorithms, Kerberos, Authentication, Grid I. INTRODUCTION The term ‘grid’ was comes in 1990s and grid computing is a term referring to the combination of various computer resources from multiple administrative domains to reach a common goal in advanced computer science. The term 'grid computing' suggests a network of computers in which each computer resources are shared with every other computer in the system. It is just an architecture that combines computer resources from various domains to reach a main objective. Resources like Processing power, Memory, data storage are all resources that helps the authorized users for specific task. The symmetric and asymmetric encryption algorithms are commonly used algorithms in grid software to provide necessary security. Now Encryption is a process of encoding the plain text into cipher text and decryption is the processes when you got cipher text just decode that into plain text. So decryption is just reversing that of encryption. Symmetric encryption is classified into 2 categories block ciphers and stream ciphers. A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. A block cipher takes a block of plain text and generates cipher text generally of same size. Block cipher avoid floating values in order to minimize the energy consumption. Block cipher supports various encryption key methods. The choice of block size does not directly affect to the strength of encryption scheme. The strength of cipher depends up on the key length. The present research work indentifies the various aspects of the enhanced traffic model for getting command on symmetric encryption algorithm those are used for security the grid. By enhancing the aspects of these algorithms various Symmetric Encryption algorithms are proposed for better throughput so that network
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 461 performance also improves and better security among the systems and obviously for the grid. The encryption process uses the Feistel structure. Feistel Structure is shown in the following illustration − The difficult part of designing a Feistel Cipher is selection of round function ‘f’. In order to be unbreakable scheme, this function needs to have several important properties that are beyond the scope of our discussion. II. Encryption Algorithm Security is based upon three main services: authentication, authorization, and encryption. It is needed to authenticate the grid before any requested access or operation comes in the grid. The grid user would be granted certain rights to access a grid resource, once the grid resource is authenticated within the grid. This, however, does not prevent data in transit between grid resources from being captured or altered. However, in this work, the researcher examined its impact on total network performance. In this paper, we will study the impact of symmetric encryption algorithms in a typical grid network. The use of cryptography always help in one way or the other. Therefore, it has been decided to model an application layer encryption decryption scenario in a typical grid computing environment and study its impact on network performance through network simulations. The time interval between two packets and the size of each packet waiting for being sent out is very important when modeling actual traffic. Therefore, if the model can accurately match these two characteristics, it is said to generate traffic that is similar to the actual data. III. Security Implementation Kerberos: Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. The Internet is an insecure place. Many of the protocols used in the Internet do not provide any security. Tools to "sniff" passwords off of the network are in common use by malicious hackers. Thus, applications which send an unencrypted password over the network are extremely vulnerable. Worse yet, other client/server applications rely on the client program to be "honest" about the identity of the user who is using it. Other applications rely on the client to restrict its activities to those which it is allowed to do, with no other enforcement by the server. Packet vs Time 0% 50% 100% 1 2 3 4 5 Encryption Methods Time Packets 0 2 4 6 8 1 2 3 4 5 6 7 8 9 Series1 Series2 Series3 Series4 Series5
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 462 Some sites attempt to use firewalls to solve their network security problems. Unfortunately, firewalls assume that "the bad guys" are on the outside, which is often a very bad assumption. Most of the really damaging incidents of computer crime are carried out by insiders. Firewalls also have a significant disadvantage in that they restrict how your users can use the Internet. (After all, firewalls are simply a less extreme example of the dictum that there is nothing more secure than a computer which is not connected to the network --- and powered off!) In many places, these restrictions are simply unrealistic and unacceptable. Kerberos as a solution to these network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server has used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business. Symmetric Encryption: Both encryption and decryption of data use the same secret key. Symmetric cryptography is also known as secret key cryptography. Asymmetric encryption: Two different keys are used for encrypting and decrypting the data. The public key encryption technique is the primary example of this using a "public key" and a "private key" pair. Therefore, it is also referred as public key cryptography. Normal Flow Under Attack After Encryption End-to-End Delay (ms) 18.22 35.25 19.09 Throughput (bps) 170099.91 65072.06 143440 The comparative analysis if the grid is under attack and after the Encryption applied on the grid. IV. CONCLUSION A model for grid security infrastructure has been implemented on network simulator NS2 and the impact of use of encryption algorithms in network performance has been measured. I have simulated a simplified model and simulated various grids before attack and after the encryption
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 6 | Sep - Oct 2017 Page: 463 algorithm is applied to that particular grid. As shown in the graphs the packets are increasing and the throughput of the nodes increased incredibly after the encryption algorithms are applied to the grid. Further, it has been shown that, randomly and dynamically changing the encryption algorithm during the data transfer has a positive impact on performance. In addition to that, random change of encryption algorithm will certainly increase the effort needed to break the code by any intervening hacker and hence at least theoretically will strengthen the security. In this simulation study, we randomly changed the encryption algorithm just to study its impact on network performance. REFERENCES 1. Foster, I. (2002). ‘What is the Grid? A Three Point Checklist’, GridToday, Vol.1, No.6. 2. Ann Chervenak, Ewa Deelman, Carl Kesselman, Bill Allcock, Ian Foster, Veronika Nefedova, Jason Lee, Alex Sim, Arie Shoshani, Bob Drach, Dean Williams,Don Middleton, (2003), ‘High- Performance Remote Access to Climate Simulation Data: A Challenge Problem for Data Grid Technologies’, Parallel Computing, Special Issue : High Performance Computing with geographical data, ACM Press, Vol.29, Issue 10, pp.1335-1356. 3. Antonio Carzaniga, Matthew J. Rutherford, Alexander L. Wolf, (2004), ‘A Routing Scheme for Content-Based Networking’, IEEE conference on Computer and Communications (INFOCOM’ 04), pp.918-928. 4. Marty Humphery, Mary R. Thomson, and Keith R.Jackson, (2005), ‘Security for Grids’, Proceeding of the IEEE, Vol.93, No.3, pp.644- 650. 5. GARUDA Project , www. garudaindia.