Show simple item record

dc.contributor.authorRuan, Xiaojun
dc.contributor.authorYang, Qing
dc.contributor.authorAlghamdi, Mohammed I.
dc.contributor.authorYin, Shu
dc.contributor.authorQin, Xiao
dc.date.accessioned2015-08-18T22:51:15Z
dc.date.available2015-08-18T22:51:15Z
dc.date.issued2012-01
dc.identifier.citationXiaojun Ruan; Qing Yang; Alghamdi, M.I.; Shu Yin; Xiao Qin, "ES-MPICH2: A Message Passing Interface with Enhanced Security," Performance Computing and Communications Conference (IPCCC), 2010 IEEE 29th International , vol.9, no.3, pp.161-168 2010en_US
dc.identifier.issn1545-5971
dc.identifier.urihttps://scholarworks.montana.edu/xmlui/handle/1/9194
dc.description.abstractAn increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat to security sensitive parallel applications running on the clusters. To address this security issue, we developed a Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network. We focus on M PI rather than other protocols, because M PI is one of the most popular communication protocols for parallel computing on clusters. Our MPI implementation-called ES-MPICH2-was built based on MPICH2 developed by the Argonne National Laboratory. Like MPICH2, ES-MPICH2 aims at supporting a large variety of computation and communication platforms like commodity clusters and high-speed networks. We integrated encryption and decryption algorithms into the MPICH2 library with the standard MPI interface and; thus, data confidentiality of MPI applications can be readily preserved without a need to change the source codes of the MPI applications. MPI-application programmers can fully configure any confidentiality services in MPICHI2, because a secured configuration file in ES-MPICH2 offers the programmers flexibility in choosing any cryptographic schemes and keys seamlessly incorporated in ES-MPICH2. We used the Sandia Micro Benchmark and Intel MPI Benchmark suites to evaluate and compare the performance of ES-MPICH2 with the original MPICH2 version. Our experiments show that overhead incurred by the confidentiality services in ES-MPICH2 is marginal for small messages. The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high-performance clusters. The executable binaries and source code of the ES-MPICH2 implementation are freely available at http:// www.eng.auburn.edu/~xqin/software/es-mpich2/.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.subjectParallel computingen_US
dc.subjectcomputer securityen_US
dc.subjectMessage passing interfaceen_US
dc.subjectEncryptionen_US
dc.titleES-MPICH2: A Message Passing Interface with Enhanced Securityen_US
dc.typeArticleen_US
mus.citation.extentfirstpage161en_US
mus.citation.extentlastpage168en_US
mus.citation.issue3en_US
mus.citation.journaltitleIEEE Transactions on Dependable and Secure Computingen_US
mus.citation.volume9en_US
mus.identifier.categoryEngineering & Computer Scienceen_US
mus.identifier.doihttp://dx.doi.org/10.1109/PCCC.2010.5682312en_US
mus.relation.collegeCollege of Engineeringen_US
mus.relation.departmentComputer Science.en_US
mus.relation.universityMontana State Universityen_US
mus.data.thumbpage8
mus.contributor.orcidYang, Qing|0000-0002-0683-5848en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


MSU uses DSpace software, copyright © 2002-2017  Duraspace. For library collections that are not accessible, we are committed to providing reasonable accommodations and timely access to users with disabilities. For assistance, please submit an accessibility request for library material.