ES-MPICH2: A Message Passing Interface with Enhanced Security

作者: Xiaojun Ruan , Qing Yang , Mohammed I. Alghamdi , Shu Yin , Xiao Qin

DOI: 10.1109/TDSC.2012.9

关键词:

摘要: An increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat security sensitive parallel applications running on the clusters. To address this issue, we developed Message Passing Interface (MPI) implementation preserve confidentiality messages communicated among nodes in an unsecured network. We focus M PI rather than protocols, because is one most popular communication protocols for computing Our MPI implementation-called ES-MPICH2-was built based MPICH2 Argonne National Laboratory. Like MPICH2, ES-MPICH2 aims at supporting large variety computation and platforms like high-speed networks. integrated encryption decryption algorithms into library with standard interface and; thus, data can be readily preserved without need change source codes applications. MPI-application programmers fully configure any services MPICHI2, secured configuration file offers flexibility choosing cryptographic schemes keys seamlessly incorporated ES-MPICH2. used Sandia Micro Benchmark Intel suites evaluate compare performance original version. experiments show that overhead incurred marginal small messages. The becomes more pronounced larger results also significantly reduced high-performance executable binaries code freely available http:// www.eng.auburn.edu/~xqin/software/es-mpich2/.

参考文章(23)
Jack J. Dongarra, David Walker, Steve W. Otto, Marc Snir, An Introduction to the MPI Standard University of Tennessee. ,(1995)
Preda Mihailescu, F Pappalardi, Elliptic Curves in Cryptography ,(1999)
Joan Daemen, Vincent Rijmen, The Design of Rijndael Springer-Verlag New York, Inc.. ,(2002) , 10.1007/978-3-662-04722-4
D.S. Wong, H.H. Fuentes, A.H. Chan, The performance measurement of cryptographic primitives on palm devices annual computer security applications conference. pp. 92- 101 ,(2001) , 10.1109/ACSAC.2001.991525
Al Geist, William Gropp, Steve Huss-Lederman, Andrew Lumsdaine, Ewing Lusk, William Saphir, Tony Skjellum, Marc Snir, MPI-2: Extending the Message-Passing Interface european conference on parallel processing. pp. 128- 135 ,(1996) , 10.1007/3-540-61626-8_16
Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen, Jukka Saarinen, Configurable hardware implementation of triple-DES encryption algorithm for wireless local area network international conference on acoustics, speech, and signal processing. ,vol. 2, pp. 1221- 1224 ,(2001) , 10.1109/ICASSP.2001.941144
C. Beame, D. Noveck, R. Thurlow, S. Shepler, M. Eisler, D. Robinson, B. Callaghan, Network File System (NFS) version 4 Protocol RFC. ,vol. 3530, pp. 1- 275 ,(2003)
Subhash Saini, Robert Ciotti, Brian T.N. Gunney, Thomas E. Spelce, Alice Koniges, Don Dossa, Panagiotis Adamidis, Rolf Rabenseifner, Sunil R. Tiyyagura, Matthias Mueller, Performance evaluation of supercomputers using HPCC and IMB Benchmarks Journal of Computer and System Sciences. ,vol. 74, pp. 965- 982 ,(2008) , 10.1016/J.JCSS.2007.07.002
M. Pourzandi, D. Gordon, W. Yurcik, G.A. Koenig, Clusters and security: distributed security for distributed systems cluster computing and the grid. ,vol. 1, pp. 96- 104 ,(2005) , 10.1109/CCGRID.2005.1558540
Dorothy E. Denning, Secure personal computing in an insecure network Communications of the ACM. ,vol. 22, pp. 476- 482 ,(1979) , 10.1145/359138.359143