Survey of Supercomputer Cluster Security Issues
نویسندگان
چکیده
The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters run and the sort of data available on supercomputer clusters are fundamentally different from the programs and data found on stand-alone PCs. This situation might attract a different type of attacker with different goals and different tactics. This paper discusses the results of a questionnaire sent out to many supercomputer clusters in the United States and relates them to a literature search that was also undertaken. These results suggest approaches that can be taken to further secure supercomputer clusters.
منابع مشابه
I-Cluster: Intense computing with untapped resources
I-Cluster is a research initiative from HP Labs Grenoble in partnership with INRIA (ID-IMAG Laboratory). It provides a distributed Peer-to-Peer framework of tools that transparently take advantage of unused network resources and federate them to crystallize into specific virtual functions. These functions are compute-inten sive services, which are statically decomposed to fit the ICluster frame...
متن کاملChallenges and Issues of Cluster Based Security in MANET
Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without preexisting infrastructures. Even though there are various studies on cluster based security in MANET but there is a clear absence of a comprehensive performance study that provides a unified platform for comparing such techniques. Thus in order to provide a better understanding of cluster based...
متن کاملThe I-Cluster Cloud: distributed management of idle resources for intense computing
I-Cluster is an HP Laboratories Grenoble initiative, in collaboration with the ID-IMAG laboratory of INRIA Rhône-Alpes, HP Brazil and the Catholic University of Rio Grande do Sul (PUCRS). I-Cluster consists of a framework of tools that transparently takes advantage of unused network resources and federates them, in order to crystallize into specific virtual functions such as supercomputing. By ...
متن کاملDistributed Authentication in GRID5000
Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Internet. Cluster grids are not only dedicated to specific applications but should allow the users to execute programs of different natures. This kind of architecture also imposes additional constraints as the geographic extension...
متن کاملA Literature Survey on Security and Clustering in Wireless Sensor Networks
Wireless sensor networks are often used for monitoring sensitive data. Therefore security is a significant issue in WSNs. We point out the constraints, security requirements and attacks in WSNs. Clustering is the concept which increases the network scalability and decreases the energy consumption in WSNs. This article presents importance of clustering and clustering algorithm in WSNs. We first ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007