Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/844102.844109acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Breaking the barriers: high performance security for high performance computing

Published: 23 September 2002 Publication History

Abstract

This paper attempts to reconcile the high performance community's requirement of high performance with the need for security, and reconcile some accepted security approaches with the performance constraints of high-performance networks. We propose a new paradigm and challenge existing practice. The new paradigm is that not all domains need longterm forward data confidentiality. In particular, we take a fresh look at security for the high-performance domain, focusing particularly on component-based applications. We discuss the security and performance requirements of this domain in order to elucidate both the constraints and opportunities. We challenge the existing practice of high-performance networks sending communication in plaintext. We propose a security mechanism and provide metrics for analyzing both the security and performance costs.

References

[1]
Allcock, Bill et. al. "Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing". IEEE Mass Storage Conference, 2001.
[2]
Bershad, Brian et. al. "Lightweight Remote Procedure Call". ACM Transactions on Computer Systems, Vol. 8, issue 1, pages 37--55, February 1990.
[3]
Clar, David D., Van Jacobson, John Romkey, and Howard Salwen. "An analysis of TCP processing overhead". IEEE Communications Magazine, June 1989.
[4]
Connelly, K. and A. Chien. "Elusive Interface Design and Analysis", Computer Science Department, Indiana University. April, 2002.
[5]
Durstenfeld, Richard. "Algorithm 235: Random Permutation {G6}". Communications of the ACM. Vol. 7, page 420, 1964.
[6]
Ferrari, Adam et. al. "A Flexible Security System for Metacomputing Environments". High Performance Computing and Networking Europe, April 1999.
[7]
Foster, Ian, Nicholas Karonis, Carl Kesselman and Steven Tuecke. "Managing Security in High-Performance Distributed Computations", Cluster Computing, Vol 1, issue 1, pages 95--107, 1998.
[8]
Knuth, Donald. 1997. The Art of Computer Programming, Vol 2, Seminumerical Algorithms. 3rd ed. Reading, Mass: Addison-Wesley.
[9]
Kay, J. and J. Pasquale. "Measurement, Analysis and Improvement of UDP/IP Throughput for the DECstation 5000", Proceedings of the 1993 Winter Usenix Conference, San Diego, USA, pages 249--258.
[10]
Plackett, R. "Random Permutations". Journal of the Royal Statistical Society, Series B (Methodological). Vol. 30, issue 3, pages 517--534, 1968.
[11]
Rao, C. "Generation of Random Permutations of Given Number of Elements Using Random Sampling Numbers". Sankhya, A. Vol. 23, pages 305--307, 1961.
[12]
Ritter, Terry. "Substitution Cipher with Pseudo-Random Shuffling: The Dynamic Substitution Combiner". Cryptologia Vol. 15, issue 4, pages 289--303, 1990.
[13]
Sandelius, Martin. "A Simple Randomization Procedure". Journal of the Royal Statistical Society: Series B (Methodological). Vol. 24, issue 2, Pages 472--481, 1962.
[14]
Sloane, N. "Encrypting by Random Rotations". Cryptography: EUROCRYPT'82. Lecture Notes in Computer Science Vol. 149, pages 71--128, 1983.
[15]
Timmerman, Brenda. "A Security Model for Dynamic Adaptive Traffic Masking". New Security Paradigms Workshop, 1997.
[16]
Tuecke, S. et. al. "Grid Service Specification". February 2002. http://www.globus.org/research/papers/gsspec.pdf
[17]
Veldema, Ronald, Rob van Nieuwpoort, Jason Maassen, Henri E. Bal and Aske Plaat. "Efficient Remote Method Invocation". Technical Report IR-450, Vrije Universiteit Amsterdam, September, 1998.

Cited By

View all
  • (2022)Exploring Light-weight Cryptography for Efficient and Secure Lossy Data Compression2022 IEEE International Conference on Cluster Computing (CLUSTER)10.1109/CLUSTER51413.2022.00018(23-34)Online publication date: Sep-2022
  • (2021)Towards Combining Error-bounded Lossy Compression and Cryptography for Scientific Data2021 IEEE High Performance Extreme Computing Conference (HPEC)10.1109/HPEC49654.2021.9622874(1-7)Online publication date: 20-Sep-2021
  • (2020)Detecting Anomalous Computation with RNNs on GPU-Accelerated HPC MachinesProceedings of the 49th International Conference on Parallel Processing10.1145/3404397.3404435(1-11)Online publication date: 17-Aug-2020
  • Show More Cited By
  1. Breaking the barriers: high performance security for high performance computing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    NSPW '02: Proceedings of the 2002 workshop on New security paradigms
    September 2002
    153 pages
    ISBN:158113598X
    DOI:10.1145/844102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 September 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. distributed computing
    2. high performance

    Qualifiers

    • Article

    Conference

    NSPW02
    Sponsor:
    NSPW02: New Security Paradigms Workshop 2002
    September 23 - 26, 2002
    Virginia, Virginia Beach

    Acceptance Rates

    NSPW '02 Paper Acceptance Rate 14 of 40 submissions, 35%;
    Overall Acceptance Rate 62 of 170 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Exploring Light-weight Cryptography for Efficient and Secure Lossy Data Compression2022 IEEE International Conference on Cluster Computing (CLUSTER)10.1109/CLUSTER51413.2022.00018(23-34)Online publication date: Sep-2022
    • (2021)Towards Combining Error-bounded Lossy Compression and Cryptography for Scientific Data2021 IEEE High Performance Extreme Computing Conference (HPEC)10.1109/HPEC49654.2021.9622874(1-7)Online publication date: 20-Sep-2021
    • (2020)Detecting Anomalous Computation with RNNs on GPU-Accelerated HPC MachinesProceedings of the 49th International Conference on Parallel Processing10.1145/3404397.3404435(1-11)Online publication date: 17-Aug-2020
    • (2020)Security-Aware Workflow Allocation Strategy for IaaS Cloud EnvironmentProceedings of International Conference on Communication and Computational Technologies10.1007/978-981-15-5077-5_22(241-252)Online publication date: 28-Aug-2020
    • (2019)Fingerprinting Anomalous Computation with RNN for GPU-accelerated HPC Machines*2019 IEEE International Symposium on Workload Characterization (IISWC)10.1109/IISWC47752.2019.9042165(253-256)Online publication date: Nov-2019
    • (2017)Multicriteria Decision Framework for Cybersecurity Risk Assessment and ManagementRisk Analysis10.1111/risa.1289140:1(183-199)Online publication date: 5-Sep-2017
    • (2017)IoT and HPC Integration: Revision and Perspectives2017 VII Brazilian Symposium on Computing Systems Engineering (SBESC)10.1109/SBESC.2017.24(132-139)Online publication date: Nov-2017
    • (2015)Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud schedulingApplied Intelligence10.1007/s10489-015-0676-843:3(662-675)Online publication date: 1-Oct-2015
    • (2013)Resource Management in Real Time Distributed System with Security ConstraintsDevelopment of Distributed Systems from Design to Application and Maintenance10.4018/978-1-4666-2647-8.ch014(230-251)Online publication date: 2013
    • (2011)Resource Management in Real Time Distributed System with Security ConstraintsInternational Journal of Distributed Systems and Technologies10.4018/jdst.20110401032:2(38-58)Online publication date: 1-Apr-2011
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media