Abstract | ||
---|---|---|
Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in utilizing such interconnects has been the send/receive communication overheads at the sender/receiver hosts. Various techniques such as user-level communication (ULC) have been proposed to mitigate this communication inefficiency. However, due to recent security breaches, focus on cluster communication security research has spurred. Such research is non-trivial due to the high-speed nature of the cluster interconnect. This paper surveys the four most popular cluster interconnects used in Top500 supercomputers and explores possible schemes to ensure secure cluster intra-communication encompassing the host processor, secure coprocessor and the network interface card (NIC) by illustrating its challenges in doing so. We then compare these schemes in terms of host processor offload, end-to-end latency, security transparency and cryptographic processing performance. Then we give an overview of security issues for those cluster interconnects designs |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/CCGRID.2006.1630920 | CCGrid |
Keywords | Field | DocType |
cluster communication security research,cluster interconnect security,multiprocessor interconnection networks,cryptography,cluster systems,cluster interconnects design,secure cluster intra-communication,top500 supercomputers,end-to-end latency,security issue,communication inefficiency,high performance cluster interconnects,security issues,security transparency,host processor offload,cryptographic processing performance,recent security breach,workstation clusters,telecommunication security,cluster interconnects,cluster communication security,popular cluster,cluster system,parallel machines,cluster intracommunication,intrusion detection,coprocessors,data security,computer science,network interface card,network interfaces | Transparency (graphic),TOP500,Cryptography,Computer science,Communication source,Inefficiency,Coprocessor,Network interface controller,Communications security,Distributed computing | Conference |
Volume | ISBN | Citations |
2 | 0-7695-2585-7 | 2 |
PageRank | References | Authors |
0.37 | 17 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Manhee Lee | 1 | 40 | 9.04 |
Eun Jung Kim | 2 | 873 | 67.64 |
Ki Hwan Yum | 3 | 320 | 28.13 |
Mazin Yousif | 4 | 874 | 59.00 |