11-03-2014, 03:37 PM
A Secured and Authenticated Message Passing Interface for Distributed Clusters
Secured and Authenticated .pdf (Size: 201.25 KB / Downloads: 33)
Abstract
In a public network, when a number of clusters
connected to each other is increased becomes a potential threat to
security applications running on the clusters. To address this
problem, a Message Passing Interface (MPI) is developed to
preserve security services in an unsecured network. The proposed
work focuses on MPI rather than other protocols because MPI is
one of the most popular communication protocols on distributed
clusters. Here AES algorithm is used for encryption/decryption
and interpolation polynomial algorithm is used for key
management which is then integrated into Message Passing
Interface Chameleon version 2 (MPICH2) with standard MPI
interface that becomes ES-MPICH2. This ES-MPICH2 is a new
MPI that provides security and authentication for distributed
clusters which is unified into cryptographic and mathematical
concept. The major desire of ES-MPICH2 is supporting a large
variety of computation and communication platforms. The
proposed system is based on both cryptographic and
mathematical concept which leads to full of error free message
passing interface with enhanced security.
INTRODUCTION
UE to the fast development of the internet, an increasing
number of universities and companies are connecting their
cluster computing systems to public networks to provide high
accessibility. Those clusters linking to the internet can be
accessed by anyone from anywhere. For example, computing
nodes in a distributed cluster system proposed by Sun
Microsystems are geographically deployed in various
computing sites. Information processed in a distributed cluster
is shared among a cluster of distributed tasks or users by the
virtue of message passing protocols (e.g., message passing
interface—MPI) or confidential data transmitted to and from
cluster computing nodes.
CONCLUSION
In the proposed work every user needs to register at a
trusted KGC initially and pre-share a secret with KGC. KGC
broadcasts cluster key information to all cluster members at
once. The confidentiality of the cluster key distribution is
information theoretically secure. Here briefly explained that
how to provide user authentication and authenticate messages
transmitted from cluster members to KGC. User message
authentication and key confirmation can be easily incorporated
into this protocol since each user has shared a secret key with
KGC during registration. For providing integrity checking sha-
1 algorithm is used and for confidentiality AES algorithm is
used for encryption and decryption. Thus this protocol leads to
full of error free message passing interface with enhanced
security.