Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option Field:A Characterization

Publisher:
Academy & Industry Reseach Collaboration Center
Publication Type:
Journal Article
Citation:
International Journal of Network Security & Its Appli..., 2010, October, 2 (4), pp. 13 - 28
Issue Date:
2010-01
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2010001063OK.pdf218.53 kB
Adobe PDF
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocols variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g, in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solultions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocols) for cloud/grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lower-level security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.
Please use this identifier to cite or link to this item: