High Performance Computing: An Introduction

advertisement
TCP/IP Security Protocol Suite for High Performance
Computing Systems
Harish Rohil, Assistant Professor (CSA), Ch. Devi Lal University, Sirsa [1]
Vikas Kamra, M.Tech (CSE), Ch. Devi Lal University, Sirsa [2]
ABSTRACT
High Performance Computing Systems (HPCS) aims to do complex and large computations in
an environment where work is performed by many communicating computers on a single task.
To provide security in high performance computing systems is a difficult task. Operating
systems, distributed environments and Internet currently suffer from poor security. They cannot
resist common security attacks. The paper aims to apply various existing technologies at
different levels of security on HPCS which leads to an increased rank of security. This paper
intends to achieve three major tasks. First, it divides the security in levels, second it covers how
to define these levels on architectures and third it proposes the existing technologies of TCP/IP
on the levels defined here. In this paper we propose a solution for applying TCP/IP Security
Protocol Suite to high performance computing systems.
KEYWORDS: CLUSTER SECURITY, GRID SECURITY, HPCS
HIGH PERFORMANCE COMPUTING: AN INTRODUCTION
High performance computing is best achieved by parallelism. Parallelism (using parallel
computers) is one of the best ways to overcome the speed bottleneck of single processors.
Many computer systems supporting high performance computing have emerged like MPP,
SMP, Distributed Systems, Cluster, and Grid. Their taxonomy is based on how their Processor,
memory and interconnect are laid out. Cluster and Grid both are sincere source of High
Performance computing. Cluster is type of distributed processing system which consists of a
collection of interconnected standalone computers working together as a single integrated
computing resource. Grid as a system that coordinates distributed resource using standard,
open general purpose protocol and interfaces to deliver non trivial quality of services. Security is
very important in every work platform. Security in Cluster and Grid deals with the issues of
Security at Resource level, Security at Communication level, Security at User level. Various
Security disciplines are Authentication, Delegation, Single sign on, Credential life span and
renewal, Authorization, Privacy, Confidentiality, Message Integrity, Policy Exchange, Secure Logging,
Assurance, Manageability, and Firewall Traversal.
Security Facilities in TCP/IP Protocol Suite
IPsec provide security to IP layer. It provides the capability to secure communication across a
LAN and across the internet. IPsec encompasses three functional areas like Authentication,
Confidentiality, Key Management. Authentication Header (AH) protocol, Encryption Security
Payload (ESP), Internet security Association and key management protocol (ISAKMP) are the
working protocols of IPsec. Secure Socket layer (SSL) make use of TCP to provide a reliable
end to end secure services. SSL is combination of four Protocols. i) SSL Record Protocol. ii)
SSL Handshake Protocol. iii) SSL Change Cipher Specification Protocol. iv) SSL Alert Protocol.
Application layer security is achieved by all these facilities. One of them is Kerberos. Kerberos is
an Authentication service designed for use in a Distributed Environment. Kerberos makes use of
a trusted third part Authentication service that enables client and server to establish
authenticated communication. Secure/Multipurpose Internet Mail Extension (S/MIME) is a
security environment to the MIME internet E-Mail format standard, based on technology from
Rivest Shannon Algorithm data security. Pretty Good Policy (PGP) Provides Confidentiality and
Authentication service that can be used for electronic mail and file storage application. PGP
provide five services i) Authentication ii) Confidentiality iii) Compression iv) E-Mail Compatibility
v) Segmentation. Secure Electronic Transaction (SET) it is an open Encryption and security
specification designed to protect credit card transaction on the internet.
Figure 1: Security Facilities in TCP/IP Protocol Suite
SECURITY APPLYING IN CLUSTER ARCHITECTURE
Cluster Architecture includes High Speed Network/Switch layer, PC workstation, communication
software, and Network Interface Hardware layer SSI and Availability infrastructure, Sequential,
Parallel Application Parallel Programming Environments. High Speed Network/Switch layerThis part in the Cluster Architecture is responsible for the communication in between the nodes.
Every Node in the Cluster is attached to this i.e. Gigabit Ethernet and Myrinet. So need of
Communication Level Security is arrived here PC workstation, communication software,
Network Interface Hardware layer- this layer consist of many high performance computers.
Communication software offers fast and reliable data communication with the help of high speed
Network. Network Interface Hardware acts as a Communication Processor and is responsible
for transmitting and receiving packets of data between cluster nodes via network/interfaces so
need of Resource and Communication Level Security is required here. SSI and Availability
infrastructure-this layer is also known as cluster middleware layer which is responsible for
providing unified system image. Sequential, Parallel Application Parallel Programming
Environments-this layer includes Applications and tools like Compiler, PVM and MPI. That is the
reason that’s why User Level Security is applying here.
Figure 2: Cluster Architecture
SECURITY APPLYING IN GRID ARCHITECTURE
Grid Architecture is layered Architecture it includes four layers these are Fabric, Resource and
Connectivity, Collective and finally User Application Layer. Fabric Layer- The Fabric layer
provides the Resources to which shared access is required .So need of Resource Level security
is arrived here. Resource and Connectivity Layer- Resource Layer include two types of
protocols one is information and another one is Management for Resources. Connectivity layer
defines core communication and authentication protocols. Communication protocols enable the
exchange of data between fabric layer resources. So need for both Resource and
Communication level security is arrived. Collective Layer- contains protocols and services not
associated with anyone specific resource but instead capturing interaction across collection of
resources. It provides directory, co-allocation, and scheduling, brokering, monitoring, data
replication services. So, need of communication level security is arrived here. User Application
Layer- The final layer n our Grid Architecture comprises the user application that operate within
a VO environment. So, here User level security is needed.
Figure 3: Grid Architecture
SECURITY ACHIEVE THROUGH EXISTING TECHNOLOGIES
There are many technologies existing that are following different security disciplines. Here we
are applying technologies that were actually applied on TCP/IP model and then we will propose
these technologies to security levels. Table 1 is defining this relationship between levels,
disciplines, and technologies. like to say User application level need to follow Authentication,
Authorization and Confidentiality etc. According to TCP/IP model Application Level Security can
be achieved by Kerberos, S/MIME, PGP, SET technologies and these technologies can satisfy
the disciplines required to follow at User/Application level. Communication Level Security needs
to follow Privacy in communication Message Integrity required policy Exchange is required to
negotiation between two authorized parties. Firewall Traversal, Delegation, Single Sign On,
Credential life span and renewal are also required at communication level. SSL/TLS work on
Transport layer in TCP/IP model so some of disciplines required at communication level can be
satisfied by this. Although we need some technologies extra then SSL/TLS yet it solve purpose
up to some extent. Resource level security need to follow Secure logging, Assurance,
Manageability disciplines. IPsec is working on IP layer so it can provide resource level security
up to some extent.
Table 1: Technologies Applied on Different Levels
CONCLUSION
Cluster and Grid systems are good example of HPCS. Requirement of security in HPCS is not
ignorable. Security is best defined by its discipline. Security can be divided into three levels
User, Resource and Communication Level. TCP/IP model is well known model for
Communication. Layer by layer security is applied in TCP/IP model. This paper presents the
Cluster and Grid Architecture and security level applied on each layer of Architectures. Lastly,
we gave a proposal of applying existing technologies from TCP/IP on cluster and grid
Architecture by security levels. Every security technology is having constraints. Constraints of
technology and architecture should be compatible like no. of users in communication like key
management issues like intrusion detection and policy management.
REFERENCES
[1] Journal of Grid Computing Main editor: P. Kacsuk ISSN: 1570-7873 (print version) Journal
no. 10723 Springer, Netherlands.
[2] High Performance Computing and Communications. Second International Conference,
HPCC 2006, Munich, Germany, Vol. 4208, p. 938, ISBN: 978-3-540-39368-9.
[3] Research on Security Architecture and Protocols of Grid Computing System by Xiangming
Fang, Shoubao Yang , Leitao Guo and Lei Zhang.
[4] Jean-Francois Lalande, David Rodriguez and Christian Toinard, Security Properties in an
Open Peer-to-Peer Network, International Journal of Network Security & Its Applications,
Academy & Industry Research Collaboration Center, Vol.1, No.3, pp.73-89, October 2009.
[5] Cryptography and Network security principles and practices by William Stallings. ISBN-81203-3018-8.
[6] High performance Cluster Computing by Raj Kumar Buyya. ISBN-978-81-317-1693-9.
[7] Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan
Kaufmann, San Francisco (1999).
Download