Security and performance evaluation of security protocols

  • Authors:
  • Richard Brooks;Benafsh Husain;SeokBae Yun;Juan Deng

  • Affiliations:
  • Clemson University, Clemson, SC;Clemson University, Clemson, SC;University of Alabama, Bir, Birmingham AL;Dunedin, NZ

  • Venue:
  • Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. Exascale storage systems should have advantages in performance and flexibility over conventional storage systems used in high performance computing. To avoid 're-inventing the wheel' we prefer securing the storage system by using existing authentication and authorization methods. It is also more secure, since existing tools have already been debugged and peer-reviewed. In this paper, the focus is on evaluating 'Designed-In-Security' systems implemented for a distributed file system of exascale capacity. Designed-In-Security systems need to be evaluated for its capability to design, develop, and evolve high-assurance software, which is predictable and reliable while managing risk, cost, schedule, quality, and complexity.