Title
An overview of security issues in cluster interconnects
Abstract
Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in utilizing such interconnects has been the send/receive communication overheads at the sender/receiver hosts. Various techniques such as user-level communication (ULC) have been proposed to mitigate this communication inefficiency. However, due to recent security breaches, focus on cluster communication security research has spurred. Such research is non-trivial due to the high-speed nature of the cluster interconnect. This paper surveys the four most popular cluster interconnects used in Top500 supercomputers and explores possible schemes to ensure secure cluster intra-communication encompassing the host processor, secure coprocessor and the network interface card (NIC) by illustrating its challenges in doing so. We then compare these schemes in terms of host processor offload, end-to-end latency, security transparency and cryptographic processing performance. Then we give an overview of security issues for those cluster interconnects designs
Year
DOI
Venue
2006
10.1109/CCGRID.2006.1630920
CCGrid
Keywords
Field
DocType
cluster communication security research,cluster interconnect security,multiprocessor interconnection networks,cryptography,cluster systems,cluster interconnects design,secure cluster intra-communication,top500 supercomputers,end-to-end latency,security issue,communication inefficiency,high performance cluster interconnects,security issues,security transparency,host processor offload,cryptographic processing performance,recent security breach,workstation clusters,telecommunication security,cluster interconnects,cluster communication security,popular cluster,cluster system,parallel machines,cluster intracommunication,intrusion detection,coprocessors,data security,computer science,network interface card,network interfaces
Transparency (graphic),TOP500,Cryptography,Computer science,Communication source,Inefficiency,Coprocessor,Network interface controller,Communications security,Distributed computing
Conference
Volume
ISBN
Citations 
2
0-7695-2585-7
2
PageRank 
References 
Authors
0.37
17
4
Name
Order
Citations
PageRank
Manhee Lee1409.04
Eun Jung Kim287367.64
Ki Hwan Yum332028.13
Mazin Yousif487459.00