ES-MPICH2: A Message
Passing Interface with Enhanced Security
ABSTRACT:
An increasing number of commodity
clusters are connected to each other by public networks, which have become a potential
threat to security sensitive parallel applications running on the clusters. To
address this security issue, we developed a
Message Passing Interface (MPI)
implementation to preserve confidentiality of messages communicated among nodes
of clusters in an unsecured network. We focus on MPI rather than other
protocols, because MPI is one of the most popular communication protocols for
parallel computing on clusters. Our MPI implementation—called ES-MPICH2—was
built based on MPICH2 developed by the Argonne National Laboratory. Like
MPICH2, ES-MPICH2 aims at supporting a large variety of computation and
communication platforms like commodity clusters and high-speed networks. We
integrated encryption and decryption algorithms into the MPICH2 library with
the standard MPI interface and; thus, data confidentiality of MPI applications
can be readily preserved without a need to change the source codes of the MPI
applications. MPI-application programmers can fully configure any
confidentiality services in MPICHI2, because a secured configuration file in
ES-MPICH2 offers the programmers flexibility in choosing any cryptographic schemes
and keys seamlessly incorporated in ES-MPICH2. We used the Sandia Micro
Benchmark and Intel MPI Benchmark suites to evaluate and compare the
performance of ES-MPICH2 with the original MPICH2 version. Our experiments show
that overhead incurred by the confidentiality services in ES-MPICH2 is marginal
for small messages. The security overhead in ES-MPICH2 becomes more pronounced
with larger messages. Our results also show that security overhead can be significantly
reduced in ES-MPICH2 by high-performance clusters. The executable binaries and
source code of the ES-MPICH2 implementation are freely available at http:// www.eng.auburn.edu/~xqin/software/es-mpich2/.
ARCHITECTURE:
EXISTING
SYSTEM:
·
Preserving data confidentiality in a
message passing environment over an un-trusted network is critical for a wide
spectrum of security-aware MPI applications, because unauthorized access to the
security-sensitive messages by un-trusted processes can lead to serious
security breaches. Hence, it is imperative to protect confidentiality of
messages exchanged among a group of trusted processes.
·
It is a nontrivial and challenging
problem to offer confidentiality services for large-scale distributed clusters,
because there is an open accessible nature of the open networks.
Disadvantages
of Existing System:
·
Cannot preserve the data confidentiality
in a message passing environment over an un-trusted network.
·
Unauthorized access causes serious
security issues.
·
The existing system also faces problem
in providing confidentiality in large scale distributed clusters.
PROPOSED
SYSTEM:
·
The proposed system solves the
challenging problem of confidentiality services for large-scale distributed
clusters, by enhancing the security of the MPI protocol by encrypting and
decrypting messages sent and received among computing nodes.
·
The proposed system focuses on MPI
rather than other protocols, because MPI is one of the most popular
communication protocols for cluster computing environments.
·
Among a variety of MPI implementations,
we picked MPICH2 developed by the Argonne National Laboratory. The design goal
of MPICH2—a widely used MPI implementation— is to combine portability with high
performance
·
We integrated encryption algorithms into
the MPICH2 library. Thus, data confidentiality of MPI applications can be
readily preserved without a need to change the source codes of the MPI
applications.
Advantages
of Proposed system:
ü Can
provide confidentiality services for large-scale distributed clusters
ü The
proposed system is highly portable.
ü The
system also poses high performance.
ü The
proposed system is very useful for protecting data transmitted in open networks
like the Internet.
ü The
ES-MPICH2 mechanism allows application programmers to easily write secure MPI
applications without additional code for data-confidentiality protection.
ü The
implemented ES-MPICH2 framework provides a secured configuration file that
enables application programmers to selectively choose any cryptographic
algorithm and symmetric-key in ES-MPICH2. This feature makes it possible for
programmers to easily and fully control the security services incorporated in
the MPICHI2 library.
OBJECTIVE:
Our main objective is to develop a Message
Passing Interface (MPI) implementation: to preserve confidentiality of messages
communicated among nodes of clusters in an unsecured network.
SYSTEM
SPECIFICATION
Hardware Requirements:
•
System : Pentium IV 2.4 GHz.
•
Hard
Disk : 40 GB.
•
Floppy
Drive : 1.44 Mb.
•
Monitor : 14’ Colour Monitor.
•
Mouse : Optical Mouse.
•
Ram : 512 Mb.
•
Keyboard : 101 Keyboard.
Software Requirements:
•
Operating system : Windows XP.
•
Coding Language : C#.NET
•
Tool : Visual Studio 2008
•
Data Base : SQL Server 2005.
REFERENCE:
Xiaojun Ruan, Qing Yang, Mohammed I.
Alghamdi, Shu Yin and Xiao Qin, “ES-MPICH2: A Message Passing Interface with
Enhanced Security”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING, VOL.9, NO.3, MAY/JUNE 2012.