skip to main content
10.1145/3332186.3332224acmotherconferencesArticle/Chapter ViewAbstractPublication PagespearcConference Proceedingsconference-collections
research-article
Open Access

Exploring Untrusted Distributed Storage for High Performance Computing

Published:28 July 2019Publication History

ABSTRACT

High performance computing systems are typically built with high-throughput and infrastructural uniformity in mind, but generally do not easily accommodate diverse data security requirements on a single cluster. Rather than fracturing that infrastructure by building many network isolated storage "islands" to secure each dataset covered by an individual data use agreement, we explore using the Ceph distributed storage system with client-side encryption to provision secure storage from a single, untrusted data lake.

References

  1. Matt Blaze. 1993. A Cryptographic File System for UNIX. In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS '93). ACM, New York, NY, USA, 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ceph Blog. {n. d.}. Ceph Blog: New in Luminous: Improved Scalability. https://ceph.com/community/new-luminous-scalability/Google ScholarGoogle Scholar
  3. Thomas William Byrne. {n. d.}. Erasure Code at Scale. https://www.youtube.com/watch?v=cX8LlFZDfqUGoogle ScholarGoogle Scholar
  4. Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.Google ScholarGoogle Scholar
  5. Alastair Dewhurst. {n. d.}. Deployment of a large erasure coded object store for data intensive science. http://193.62.125.70/CIUK2017/AlastairDewhurst_STFC.pdfGoogle ScholarGoogle Scholar
  6. Ceph Documentation. {n. d.}. Ceph Blog Object Gateway. http://docs.ceph.com/docs/mimic/radosgw/Google ScholarGoogle Scholar
  7. eCryptfs Bug Tracker. {n. d.}. ecryptfs does not work properly over nfs, cifs, samba, WebDAV, or aufs. https://bugs.launchpad.net/ecryptfs/+bug/277578Google ScholarGoogle Scholar
  8. Richard Graham, Timothy S. Woodall, and Jeffrey Squyres. 2005. Open MPI: A flexible high performance MPI. 228--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Taylor. Hornby. 2014. EncFS Security Audit. Technical Report.Google ScholarGoogle Scholar
  10. Taylor. Hornby. 2017. Security Audit of gocryptfs v1.2. Technical Report.Google ScholarGoogle Scholar
  11. Sochat V Kurtzer GM and Bauer MW. 2017. Singularity: Scientific containers for mobility of compute. Computer (2017).Google ScholarGoogle Scholar
  12. Leslie Lamport. 1998. The Part-time Parliament. ACM Trans. Comput. Syst. 16, 2 (May 1998), 133--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. mdtest. {n. d.}. mdtest. https://github.com/hpc/iorGoogle ScholarGoogle Scholar
  14. NESE. {n. d.}. NESE Overview. http://nese.mghpcc.org/about/Google ScholarGoogle Scholar
  15. James. Plank. 2013. Erasure Codes for Storage Systems. Technical Report.Google ScholarGoogle Scholar
  16. J. Riley, J. Noss, W. Dillingham, J. Cuff, and I. M. Llorente. 2017. A High-Availability Cloud for Research Computing. Computer 50, 6 (2017), 92--95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. s3fs. {n. d.}. s3fs. https://github.com/s3fs-fuse/s3fs-fuseGoogle ScholarGoogle Scholar
  18. Slurm. {n. d.}. Slurm Multi-Category Security. https://slurm.schedmd.com/mcs.htmlGoogle ScholarGoogle Scholar
  19. Sage A. Weil, Scott A. Brandt, Ethan L. Miller, Darrell D. E. Long, and Carlos Maltzahn. 2006. Ceph: A Scalable, High-Performance Distributed File System. In OSDI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Sage A. Weil, Scott A. Brandt, Ethan L. Miller, and Carlos Maltzahn. 2006. CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data. In Proceedings of the 2006 ACM/IEEE Conference on Supercomputing (SC '06). ACM, New York, NY, USA, Article 122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sage A. Weil, Andrew W. Leung, Scott A. Brandt, and Carlos Maltzahn. 2007. RADOS: A Scalable, Reliable Storage Service for Petabyte-scale Storage Clusters. In Proceedings of the 2Nd International Workshop on Petascale Data Storage: Held in Conjunction with Supercomputing '07 (PDSW '07). ACM, New York, NY, USA, 35--44. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Exploring Untrusted Distributed Storage for High Performance Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      PEARC '19: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning)
      July 2019
      775 pages
      ISBN:9781450372275
      DOI:10.1145/3332186
      • General Chair:
      • Tom Furlani

      Copyright © 2019 Owner/Author

      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 July 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate133of202submissions,66%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader