Download presentation
Presentation is loading. Please wait.
Published byRosamund Curtis Modified over 9 years ago
1
SafeScale project C. CERIN, J.L. PAZAT, J.L. ROCH, R. KERYELL https://www-lipn.univ-paris13.fr/safescale/
2
SafeScale overview Funded by ANR (Agence Nationale de la Recherche) 3 years term project (started on January 1st, 2006) Partners LIPN (Paris XIII) (coordinator) christophe.cerin@lipn.univ-paris13.fr christophe.cerin@lipn.univ-paris13.fr IMAG/INRIA (Grenoble), Jean-Louis.Roch@imag.fr Jean-Louis.Roch@imag.fr IRISA/INRIA (Rennes), Jean-Louis.Pazat@irisa.fr Jean-Louis.Pazat@irisa.fr ENSTB (Brest) Ronan.Keryell@enst-bretagne.fr Ronan.Keryell@enst-bretagne.fr Université Joseph Fourier (Grenoble). Roland.Gillard@ujf-grenoble.fr Roland.Gillard@ujf-grenoble.fr
3
Research focus Security and safety in global ambient computing systems computational grid peer-to-peer environments. Environment Middleware provides strong authentication, secure communications and resource management. Computational nodes operate in an unbounded environment subjected to a wide range of attacks. Fail-stop failures: connection/disconnections of heterogeneous resources Malicious failures: forgery of results on resources (Trojan horses, …) Challenge Develop applications with guarantees on correctness of computed results.
4
Two kinds of security issues (1/2) Internet 1.Node failures “fail stop” model User
5
Two kinds of security issues (2/2) Internet 1.Task forgery – “massive attacks” User worm,virus bad result
6
Works objective study and evaluate a methodology and tools to obtain certified results. our approach Adaptability to support addition / resilience of resources –dynamic task scheduling and mapping –adaptability of software components Probabilistic certification of results to support forgeries –Verifications of few randomly chosen tasks –Performed on trusted resources (hardware crypto-processor) Validation on two class of large scale computational applications –data merging and sorting –finite field computations experiments on the grid'5000 architecture
7
Running an application: from this...
8
To that... How to detect: random faults (type 1) or malicious (systematic) faults (type 2)? Send certified codes on ill machines to detect the nature of faults? (testing?)
9
Known/Unknown tools, results Platforms: Kaapi, XtremWeb, Grid5000 Fault-tolerance and adaptive programming (IRISA, IMAG) Key point : application adaptability Fine-grain work stealing [IMAG] (provable performances on processors with changing speeds) Adaptation of components [IRISA] Probabilistic certification (ENSTB, IMAG) Detection of massive attacks [IMAG] Crypto-processor (ENSTB) Applications: Sorting on an heterogeneous cluster (LIPN) Classification of provably secure cryptographic boxes (UJF)
10
Conclusion https://www-lipn.univ-paris13.fr/safescale/ https://www-lipn.univ-paris13.fr/safescale/ pôle « Grille Système Parallélisme » (http://gsp.asr.cnrs.fr/)http://gsp.asr.cnrs.fr/ action sécurité et sûreté
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.