-
CryptMPI: A Fast Encrypted MPI Library
Authors:
Abu Naser,
Cong Wu,
Mehran Sadeghi Lahijani,
Mohsen Gavahi,
Viet Tung Hoang,
Zhi Wang,
Xin Yuan
Abstract:
The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment. However, supporting security in the communication infrastructure of today's public cloud is challenging, because current networks for data centers are so fast that adding encryption can incur very significant overheads. In this work, we introduce Cry…
▽ More
The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment. However, supporting security in the communication infrastructure of today's public cloud is challenging, because current networks for data centers are so fast that adding encryption can incur very significant overheads. In this work, we introduce CryptMPI, a high performance encrypted MPI library that supports communication with both integrity and privacy. We present the techniques in CryptMPI and report our benchmarking results using micro-benchmarks and NAS parallel benchmarks. The evaluation results indicate that the aforementioned techniques are effective in improving the performance of encrypted communication.
△ Less
Submitted 2 November, 2020; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications
Authors:
Abu Naser,
Mehran Sadeghi Lahijani,
Cong Wu,
Mohsen Gavahi,
Viet Tung Hoang,
Zhi Wang,
Xin Yuan
Abstract:
In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data. To meet this goal, we consider incorporating encryption in the Message Passing Interface (MPI) library. We empirically evaluate four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, and…
▽ More
In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data. To meet this goal, we consider incorporating encryption in the Message Passing Interface (MPI) library. We empirically evaluate four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, and CryptoPP using micro-benchmarks and NAS parallel benchmarks on two different networking technologies, 10Gbps Ethernet and 40Gbps InfiniBand. We also develop accurate models that allow us to reason about the performance of encrypted MPI communication in different situations and give guidance on how to improve encrypted MPI performance.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Constrained Linear Movement Model (CALM): Simulation of passenger movement in airplanes
Authors:
Mehran Sadeghi Lahijani,
Tasvirul Islam,
Ashok Srinivasan,
Sirish Namilae
Abstract:
Pedestrian dynamics models the walking movement of individuals in a crowd. It has recently been used in the analysis of procedures to reduce the risk of disease spread in airplanes, relying on the SPED model. This is a social force model inspired by molecular dynamics; pedestrians are treated as point particles, and their trajectories are determined in a simulation. A parameter sweep is performed…
▽ More
Pedestrian dynamics models the walking movement of individuals in a crowd. It has recently been used in the analysis of procedures to reduce the risk of disease spread in airplanes, relying on the SPED model. This is a social force model inspired by molecular dynamics; pedestrians are treated as point particles, and their trajectories are determined in a simulation. A parameter sweep is performed to address uncertainties in human behavior, which requires a large number of simulations.
The SPED model's slow speed is a bottleneck to performing a large parameter sweep. This is a severe impediment to delivering real-time results, which are often required in the course of decision meetings, especially during emergencies. We propose a new model, called CALM, to remove this limitation. It is designed to simulate a crowd's movement in constrained linear passageways, such as inside an aircraft. We show that CALM yields realistic results while improving performance by two orders of magnitude over the SPED model.
△ Less
Submitted 13 October, 2019;
originally announced October 2019.
-
P4QS: A Peer to Peer Privacy Preserving Query Service for Location-Based Mobile Applications
Authors:
Meysam Ghaffari,
Nasser Ghadiri,
Mohammad Hossein Manshaei,
Mehran Sadeghi Lahijani
Abstract:
The location-based services provide an interesting combination of cyber and physical worlds. However, they can also threaten the users' privacy. Existing privacy preserving protocols require trusted nodes, with serious security and computational bottlenecks. In this paper, we propose a novel distributed anonymizing protocol based on peer-to-peer architecture. Each mobile node is responsible for an…
▽ More
The location-based services provide an interesting combination of cyber and physical worlds. However, they can also threaten the users' privacy. Existing privacy preserving protocols require trusted nodes, with serious security and computational bottlenecks. In this paper, we propose a novel distributed anonymizing protocol based on peer-to-peer architecture. Each mobile node is responsible for anonymizing a specific zone. The mobile nodes collaborate in anonymizing their queries, without the need not get access to any information about each other. In the proposed protocol, each request will be sent with a randomly chosen ticket. The encrypted response produced by the server is sent to a particular mobile node (called broker node) over the network, based on the hash value of this ticket. The user will query the broker to get the response. All parts of the messages are encrypted except the fields required for the anonymizer and the broker. This will secure the packet exchange over the P2P network. The proposed protocol was implemented and tested successfully, and the experimental results showed that it could be deployed efficiently to achieve user privacy in location-based services.
△ Less
Submitted 7 June, 2016;
originally announced June 2016.