Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization

Publication Type:
Journal Article
Citation:
International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010
Metrics:
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2010001063OK.pdf218.53 kB
Adobe PDF
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lowerlevel security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.
Please use this identifier to cite or link to this item: