Abstract
This paper presents a framework for GSI to integrate security components from the viewpoint of connection. To enhance security and security of virtual organization, A multi-homed architecture model is given, which employs a mechanism based on modified SOCKSv5 to support the resource utilization for GSI itself. The framework and the modified mechanism is independently. With the mechanism, the GSI can provide dynamic connection through multiple exits in a virtual organization transparently, and the traffic flow can switch smoothly among the multiple proxies by maintaining a coherent connection context. With the cooperation of some other GSI security components, the model and the mechanism enhance the security and performance of GSI to some extent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dwoskin1, J., Basu, S., Talwar, V., Kumar, R., Kitson, F., Lee, R.: Security Issues for Interactive Grids. In: The 37th Annual Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, November 9-12 (2003)
McMahon, P.: GSS-API Authentication Method for SOCKS Version 5, IETF RFC1961 (June 1996)
Denis, A., Aumage, O., Hofman, R., Verstoep, K., Kielmann, T., Bal, H.E.: Wide-Area Communication for Grids: An Integrated Solution to Connectivity, Performance and Security Problems, http://www.cs.vu.nl/ibis/
Isaacs, R., Leslie, I.: Support for Resource-Assured and Dynamic Virtual Private Networks. IEEE Journal On Selected Areas in Communications 19(3) (March 2001)
Bartlett, J.: Route control-optimized multi-homed connections for Performance, Load and Cost, Business Communication (January 2002), http://www.bcr.com
Bhagwat, P., Maltx, D.A., et al.: MSOCKS+: an Architecture for Transport Layer Mobility. Computer Networks 39, 385–403 (2002)
Leech, M., Ganis, M., Lee, Y., et al.: SOCKS Protocol version 5, RFC 1928 (March 1996)
Dierks, T., Allen, C.: The TLS protocol version 1 IETF RFC2246 (January 1999)
Chun, Y.: The Study and implementation on employing SOCKSv5/TLS to Construct VPN. Journal of University of Electronics Science and Technology of China 30(3) (June 2001) (in Chinese)
Hanping, H., Baoliang, Z., xiang, C., Haiyan, Z.: A Transmission Cluster model based on Active Defense. In: Proceeding of Conference 2002 on Network and Information Security, Beijing, January 2003, pp. 346–353 (2003) (in Chinese)
Touch, J.: Dynamic Internet Overlay Deployment and Management Using the XBone. Computer Networks, 117–135 (July 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, B., Hu, H., Wu, X., Kong, T. (2004). Security Enhanced to GSI: An Integrated Framework with a Mechanism. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004 Workshops. GCC 2004. Lecture Notes in Computer Science, vol 3252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30207-0_63
Download citation
DOI: https://doi.org/10.1007/978-3-540-30207-0_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23578-1
Online ISBN: 978-3-540-30207-0
eBook Packages: Springer Book Archive