This document proposes a system called ES-MPICH2 that enhances security in message passing interfaces. It aims to implement encryption and decryption algorithms in the MPICH2 library to secure data shared over computer clusters without changing applications. The system provides confidentiality by encrypting messages between nodes using AES and maintains integrity with SHA-1. It addresses issues like unauthorized access and low data consistency in existing open network cluster systems.
APM Welcome, APM North West Network Conference, Synergies Across Sectors
message passing interface
1. A MESSAGE PASSING INTERFACE WITH ENHANCED SECURITY
OBJECTIVE:
The main objective of this system is to implement the security in the
Message Parsing Interface by integrating the encryption and decryption algorithms
in to the MPICH2 library with the standard MPI Interface.
PROBLEM STATEMENT:
The problems found in existing system as, Threat to the confidentiality of
the data shared among the nodes in the computing clusters of open network.
Anybody can access to the data in an open network of computer clusters. Due to
this the consistency of the data received by the processes in the network is low.
This may cause to process failure. Unauthorized access to the security-sensitive
messages by entrusted processes can lead to security breaches.
ABSTRACT:
The Message Passing Interface (MPI) is a library specification for message-
passing among the nodes of computer clusters of open network. Message Passing
Interface (MPI) is a standardized and portable message-passing system designed
by a group of researchers from academia and industry to function on a wide variety
of parallel computers.MPI is one of the most popular communication protocols for
cluster computing environments.
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
2. A computer cluster consists of a set of loosely connected computers that
work together so that in many respects they can be viewed as a single system.
Clusters are usually deployed to improve performance and availability over that of
a single computer. But, the computer clusters are connected to the multiple number
of nodeswithin the network over the internet. It leads to the threat to the
confidentiality of the data shared among the multiple processes in the computer
cluster. This paper provides a systematic approach to improve the security in the
Message Parsing Interface by implementing the encryption and decryption
algorithms to the MPI libraries without changing the application programming.
EXISTING SYSTEM:
MPICH2 is an implementation of the Message-Passing Interface (MPI). The
goals of MPICH2 are to provide an MPI implementation for important platforms,
including clusters, SMPs, and massively parallel processors. It also provides a tool
for MPI implementation research and for developing new and better parallel
programming environments.
DISADVANTAGES:
Threat to the confidentiality of the data shared among the nodes in the
computing clusters of open network.
Anybody can access to the data in an open network of computer
clusters. Due to this the consistency of the data received by the
processes in the network is low. This may cause to process failure.
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
3. Unauthorized access to the security-sensitive messages by untrusted
processes can lead to security breaches.
PROPOSED SYSTEM:
The proposed system is ES-MPICH2 framework implemented based on the
MPICH2. Inthis to provide the data confidentiality we are providing security for
MPI protocol by encrypting and decrypting the messages sent among the
computing nodes. Encryption algorithms are integrated into the MPICH2 library at
communication channel level of the MPICH2.
ADVANTAGES:
Provides security for the data shared among the computing nodes by
implementing the encryption and decryption algorithms.
By using the block ciphers the integrity of data is maintained.
The data shared among the nodes in the computer cluster are made
confidential without changing the source code of applications that are
runs under the MPI.
ALGORITHM USED:
1. AES (Advanced Encryption Standard)
2. SHA -1
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
4. ARCHITECTURE DIAGRAM:
SYSTEM REQUIREMENTS:
Hardware Requirements:
Intel Pentium IV
256/512 MB RAM
1 GB Free disk space or greater
1 GB on Boot Drive
1 Network Interface Card (NIC)
Software Requirements:
MS Windows XP/2000
MS IE Browser 6.0/later
MS .Net Framework 2.0
MS Visual Studio.Net 2005
Internet Information Server (IIS)
MS SQL Server 2000
Windows Installer 3.1
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
5. APPLICATIONS:
1. Funds Transfer
2. Research Oriented Applications
3. Military Secret Sharing
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765