Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 2, Issue. 8, August 2013, pg.115 – 119
RESEARCH ARTICLE
© 2013, IJCSMC All Rights Reserved 115
Parallel Encryption Technique Combined
With Secure Single Sign-On Mechanism
for Distributed Computer Networks
R. Suganya
1
, A.K. Sathiya Bama
2
1
Research Scholar, Department Of Computer Science, Vivekanandha College, Tiruchengode,
Tamil Nadu, India
2
Assistant Professor, Department Of Computer Application, Vivekanandha College, Tiruchengode,
Tamil Nadu, India
1
suganya2121@gmail.com;
2
ask_jnf@yahoo.com
Abstract— These security-enhanced communication tools in a wide-area Globus test bed that we are
constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow large-
scale application experiments and hence provide feedback on how our security mechanisms work in practical
situations. It seems certain that encryption performance will be a bottleneck in many situations. Hence, we
will experiment with various performance enhancement techniques, including specialized protocols, parallel
encryption algorithms combined with secure single sign mechanism, and use of dedicated encryption
processors. Another interesting direction for further work will be to investigate the feasibility of using the
Meta computing Directory Service to determine when secure communication mechanisms must be employed,
for example because communication occurs over insecure network connections. Clearly one issue that will be
important to address in this context is the authenticity of resource database entries.
Key Terms: - Communication; Dos; Key Distribution; Mobile Devices; User Identification
I. INTRODUCTION
The exercise of high-performance networks to pair geographically distributed supercomputers, database
systems, generalized scientific instruments, etc., is enabling novel applications in areas such as collaborative
engineering, computer-enhanced instrumentation, and ultra-large-scale scientific simulation. However,
widespread use of such applications depends crucially on the availability of appropriate security mechanisms.
Owners of resources require authentication mechanisms to protect themselves against malicious users. Users of
resources may also demand authentication of resources, in order to protect themselves against spoofing by
malicious resource providers. Users will often need to ensure that the integrity and confidentiality of data
communicated between resources are not compromised, particularly when communication occurs over public
networks. Other forms of attack can also be of concern, such as denial of service attacks against applications
that use supercomputers to control remote devices.
The task of meeting these security requirements is complicated by the distinctive program structures,
computing environments, and performance requirements encountered in high-performance systems. Traditional