Follow us on Facebook

Header Ads

ES-MPICH2: A Message Passing Interface with Enhanced Security


ES-MPICH2: A Message Passing Interface with Enhanced Security

ABSTRACT:

An increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat to security sensitive parallel applications running on the clusters. To address this security issue, we developed a
Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network. We focus on MPI rather than other protocols, because MPI is one of the most popular communication protocols for parallel computing on clusters. Our MPI implementation—called ES-MPICH2—was built based on MPICH2 developed by the Argonne National Laboratory. Like MPICH2, ES-MPICH2 aims at supporting a large variety of computation and communication platforms like commodity clusters and high-speed networks. We integrated encryption and decryption algorithms into the MPICH2 library with the standard MPI interface and; thus, data confidentiality of MPI applications can be readily preserved without a need to change the source codes of the MPI applications. MPI-application programmers can fully configure any confidentiality services in MPICHI2, because a secured configuration file in ES-MPICH2 offers the programmers flexibility in choosing any cryptographic schemes and keys seamlessly incorporated in ES-MPICH2. We used the Sandia Micro Benchmark and Intel MPI Benchmark suites to evaluate and compare the performance of ES-MPICH2 with the original MPICH2 version. Our experiments show that overhead incurred by the confidentiality services in ES-MPICH2 is marginal for small messages. The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high-performance clusters. The executable binaries and source code of the ES-MPICH2 implementation are freely available at http:// www.eng.auburn.edu/~xqin/software/es-mpich2/.


ARCHITECTURE:


EXISTING SYSTEM:

·        Preserving data confidentiality in a message passing environment over an un-trusted network is critical for a wide spectrum of security-aware MPI applications, because unauthorized access to the security-sensitive messages by un-trusted processes can lead to serious security breaches. Hence, it is imperative to protect confidentiality of messages exchanged among a group of trusted processes.

·        It is a nontrivial and challenging problem to offer confidentiality services for large-scale distributed clusters, because there is an open accessible nature of the open networks.

Disadvantages of Existing System:

·        Cannot preserve the data confidentiality in a message passing environment over an un-trusted network.

·        Unauthorized access causes serious security issues.

·        The existing system also faces problem in providing confidentiality in large scale distributed clusters.



PROPOSED SYSTEM:

·        The proposed system solves the challenging problem of confidentiality services for large-scale distributed clusters, by enhancing the security of the MPI protocol by encrypting and decrypting messages sent and received among computing nodes.


·        The proposed system focuses on MPI rather than other protocols, because MPI is one of the most popular communication protocols for cluster computing environments.

·        Among a variety of MPI implementations, we picked MPICH2 developed by the Argonne National Laboratory. The design goal of MPICH2—a widely used MPI implementation— is to combine portability with high performance

·        We integrated encryption algorithms into the MPICH2 library. Thus, data confidentiality of MPI applications can be readily preserved without a need to change the source codes of the MPI applications.


Advantages of Proposed system:

ü Can provide confidentiality services for large-scale distributed clusters

ü The proposed system is highly portable.
ü The system also poses high performance.
ü The proposed system is very useful for protecting data transmitted in open networks like the Internet.

ü The ES-MPICH2 mechanism allows application programmers to easily write secure MPI applications without additional code for data-confidentiality protection.

ü The implemented ES-MPICH2 framework provides a secured configuration file that enables application programmers to selectively choose any cryptographic algorithm and symmetric-key in ES-MPICH2. This feature makes it possible for programmers to easily and fully control the security services incorporated in the MPICHI2 library.

OBJECTIVE:

Our main objective is to develop a Message Passing Interface (MPI) implementation: to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network.

SYSTEM SPECIFICATION

Hardware Requirements:

         System                  :   Pentium IV 2.4 GHz.
         Hard Disk            :   40 GB.
         Floppy Drive       :   1.44 Mb.
         Monitor                :   14’ Colour Monitor.
         Mouse                  :   Optical Mouse.
         Ram                      :   512 Mb.
         Keyboard              :   101 Keyboard.


Software Requirements:

         Operating system           :   Windows XP.
         Coding Language :   C#.NET
         Tool                     :   Visual Studio 2008
         Data Base             :   SQL Server 2005.

REFERENCE:

Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin and Xiao Qin, “ES-MPICH2: A Message Passing Interface with Enhanced Security”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL.9, NO.3, MAY/JUNE 2012.