Abstract
Security and fault-tolerance is a major issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. In [1,2] is presented a novel, robust and secure architecture able to offer intensive parallel computing in environments where resources may be corrupted. Some efficient result-checking mechanisms are used to certify the results of an execution. The architecture is based on a limited number of safe resources that host the checkpoint server (used to store the graph) and the verifiers able to securely re-execute piece of tasks in a trusted way.
This article focus on the effective construction of strongly secured resources. Our approach combine both software and hardware components to cover the full spectrum of security constraints. The proposed computing platform is validated over a medical application and some experimental results are presented.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Krings, A., Roch, J.L., Jafar, S., Varrette, S.: A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 323–333. Springer, Heidelberg (2005)
Varrette, S., Roch, J.L., Montagnat, J., Seitz, L., Pierson, J.M., Leprévost, F.: Safe Distributed Architecture for Image-based Computer Assisted Diagnosis. In: IEEE 1st International Workshop on Health Pervasive Systems (HPS 2006), Lyon, France (June 2006)
Foster, I., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. International J. of Supercomputer Applications and High Performance Computing 11(2), 115–128 (Summer 1997)
Molnar, D.: The SETI@Home Problem (November 2000), http://www.acm.org/crossroads/columns/onpatrol/september2000.html
Necula, G.C., Lee, P.: Proof-carrying code. Technical Report CMU-CS-96-165, School of Computer Science, Pittsburg (1996)
Aucsmith, D.: Tamper resistant software: An implementation. In: Information Hiding, pp. 317–333 (1996)
Sarmenta, L.F.G.: Protecting Programs from Hostile Environments: Encrypted Computation, Obfuscation, and Other Techniques. In: Area exam paper, Dept. of Electrical Engineering and Computer Science. MIT, Cambridge (1999)
Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. In: IEEE Transactions on Software Engineering, vol. 28, pp. 735–746 (August 2002)
Loureiro, S., Bussard, L., Roudier, Y.: Extending tamper-proof hardware security to untrusted execution environments. In: CARDIS, pp. 111–124 (2002)
Varrette, S., Georget, S., Montagnat, J., Roch, J.-L., Leprevost, F.: Distributed Authentication in GRID5000. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM-WS 2005. LNCS, vol. 3762, pp. 314–326. Springer, Heidelberg (2005)
Dagorn, N., Bernard, N., Varrette, S.: Practical Authentication in Distributed Environments. In: IEEE (ed.) IEEE International Computer Systems and Information Technology Conference (ICSIT 2005), Sheraton Hotel, Alger, July 19–21 (2005); Still waiting for precisions on proceedings
Neuman, C., Ts’o, T.: Kerberos: An authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994), http://gost.isi.edu/publications/kerberos-neuman-tso.html
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Fifth ACM Conference on Computer and Communications Security Conference, San Francisco, California, November 3-5, pp. 83–92 (1998)
Jafar, S., Varrette, S., Roch, J.L.: Using Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations. In: IEEE (ed.): IEEE DEXA 2004 - Workshop GLOBE 2004: Grid and Peer-to-Peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems, Zaragoza, Spain, pp. 512–516 (September 2004)
Varrette, S.: Sécurité des Architectures de Calcul Distribué: Authentification et Certification de Résultats. Ph.D thesis, INP Grenoble et Université du Luxembourg (September 2007); Version beta en cours de review
Roch, J.L., Varrette, S.: Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product. In: Proceedings of the ACM International Workshop on Parallel Symbolic Computation 2007 (PASCO 2007), Ontario, Canada. ACM, New York (2007)
Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural support for copy and tamper resistant software. In: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (Asplos IX), pp. 168–177 (October 2000)
Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Aegis: Architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th International Conference on Supercomputing (ICS 2003), pp. 160–171 (June 2003)
Keryell, R.: Cryptopage-1: vers la fin du piratage informatique? In: Symposium d’Architecture (SympA’6), Besançon, France, pp. 35–44 (June 2000)
Zhuang, X., Zhang, T., Pande, S.: Hide: an infrastructure for efficiently protecting information leakage on the address bus. In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (Asplos-XI), pp. 72–84. ACM Press, New York (2004)
Duc, G., Keryell, R., Lauradoux, C.: CryptoPage : Support matériel pour cryptoprocessus. Technique et Science Informatiques 24, 667–701 (2005)
Duc, G., Keryell, R.: CryptoPage: an efficient secure architecture with memory encryption, integrity and information leakage protection. In: Proceedings of the 22th Annual Computer Security Applications Conference (Acsac 2006). IEEE Computer Society, Los Alamitos (2006)
Roch, J.L., Traore, D., Bernard, J.: On-line adaptive parallel prefix computation. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 841–850. Springer, Heidelberg (2006)
Ancourt, C., Coelho, F., Creusillet, B., Keryell, R.: How to add a new phase in PIPS: the case of dead code elimination. In: Proceedings of the Sixth Workshop on Compilers for Parallel Computers (CPC 1996), Aachen, Germany, pp. 19–30 (December 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Varrette, S., Roch, JL., Duc, G., Keryell, R. (2009). Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments. In: César, E., et al. Euro-Par 2008 Workshops - Parallel Processing. Euro-Par 2008. Lecture Notes in Computer Science, vol 5415. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00955-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-00955-6_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00954-9
Online ISBN: 978-3-642-00955-6
eBook Packages: Computer ScienceComputer Science (R0)