A MESSAGE PASSING INTERFACE WITH ENHANCED SECURITY



OBJECTIVE:

      The main objective of this system is to implement the security in the
Message Parsing Interface by integrating the encryption and decryption algorithms
in to the MPICH2 library with the standard MPI Interface.


PROBLEM STATEMENT:


      The problems found in existing system as, Threat to the confidentiality of
the data shared among the nodes in the computing clusters of open network.
Anybody can access to the data in an open network of computer clusters. Due to
this the consistency of the data received by the processes in the network is low.
This may cause to process failure. Unauthorized access to the security-sensitive
messages by entrusted processes can lead to security breaches.


ABSTRACT:


      The Message Passing Interface (MPI) is a library specification for message-
passing among the nodes of computer clusters of open network. Message Passing
Interface (MPI) is a standardized and portable message-passing system designed
by a group of researchers from academia and industry to function on a wide variety
of parallel computers.MPI is one of the most popular communication protocols for
cluster computing environments.



                              Z Technologies
                     www.ztech.ininfo@ztech.incall : 91760 91765
A computer cluster consists of a set of loosely connected computers that
work together so that in many respects they can be viewed as a single system.
Clusters are usually deployed to improve performance and availability over that of
a single computer. But, the computer clusters are connected to the multiple number
of nodeswithin the network over the internet. It leads to the threat to the
confidentiality of the data shared among the multiple processes in the computer
cluster. This paper provides a systematic approach to improve the security in the
Message Parsing Interface by implementing the encryption and decryption
algorithms to the MPI libraries without changing the application programming.


EXISTING SYSTEM:


      MPICH2 is an implementation of the Message-Passing Interface (MPI). The
goals of MPICH2 are to provide an MPI implementation for important platforms,
including clusters, SMPs, and massively parallel processors. It also provides a tool
for MPI implementation research and for developing new and better parallel
programming environments.


DISADVANTAGES:


          Threat to the confidentiality of the data shared among the nodes in the
             computing clusters of open network.
          Anybody can access to the data in an open network of computer
             clusters. Due to this the consistency of the data received by the
             processes in the network is low. This may cause to process failure.



                               Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
 Unauthorized access to the security-sensitive messages by untrusted
            processes can lead to security breaches.
PROPOSED SYSTEM:

      The proposed system is ES-MPICH2 framework implemented based on the
MPICH2. Inthis to provide the data confidentiality we are providing security for
MPI protocol by encrypting and decrypting the messages sent among the
computing nodes. Encryption algorithms are integrated into the MPICH2 library at
communication channel level of the MPICH2.


ADVANTAGES:

          Provides security for the data shared among the computing nodes by
            implementing the encryption and decryption algorithms.
          By using the block ciphers the integrity of data is maintained.
          The data shared among the nodes in the computer cluster are made
            confidential without changing the source code of applications that are
            runs under the MPI.

ALGORITHM USED:

      1. AES (Advanced Encryption Standard)
      2. SHA -1




                              Z Technologies
                     www.ztech.ininfo@ztech.incall : 91760 91765
ARCHITECTURE DIAGRAM:




SYSTEM REQUIREMENTS:

 Hardware Requirements:

              Intel Pentium IV
              256/512 MB RAM
              1 GB Free disk space or greater
              1 GB on Boot Drive
               1 Network Interface Card (NIC)


 Software Requirements:

              MS Windows XP/2000
              MS IE Browser 6.0/later
              MS .Net Framework 2.0
              MS Visual Studio.Net 2005
              Internet Information Server (IIS)
              MS SQL Server 2000
              Windows Installer 3.1

                          Z Technologies
                www.ztech.ininfo@ztech.incall : 91760 91765
APPLICATIONS:



        1.   Funds Transfer
        2.   Research Oriented Applications
        3.   Military Secret Sharing




                         Z Technologies
                www.ztech.ininfo@ztech.incall : 91760 91765

message passing interface

  • 1.
    A MESSAGE PASSINGINTERFACE WITH ENHANCED SECURITY OBJECTIVE: The main objective of this system is to implement the security in the Message Parsing Interface by integrating the encryption and decryption algorithms in to the MPICH2 library with the standard MPI Interface. PROBLEM STATEMENT: The problems found in existing system as, Threat to the confidentiality of the data shared among the nodes in the computing clusters of open network. Anybody can access to the data in an open network of computer clusters. Due to this the consistency of the data received by the processes in the network is low. This may cause to process failure. Unauthorized access to the security-sensitive messages by entrusted processes can lead to security breaches. ABSTRACT: The Message Passing Interface (MPI) is a library specification for message- passing among the nodes of computer clusters of open network. Message Passing Interface (MPI) is a standardized and portable message-passing system designed by a group of researchers from academia and industry to function on a wide variety of parallel computers.MPI is one of the most popular communication protocols for cluster computing environments. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 2.
    A computer clusterconsists of a set of loosely connected computers that work together so that in many respects they can be viewed as a single system. Clusters are usually deployed to improve performance and availability over that of a single computer. But, the computer clusters are connected to the multiple number of nodeswithin the network over the internet. It leads to the threat to the confidentiality of the data shared among the multiple processes in the computer cluster. This paper provides a systematic approach to improve the security in the Message Parsing Interface by implementing the encryption and decryption algorithms to the MPI libraries without changing the application programming. EXISTING SYSTEM: MPICH2 is an implementation of the Message-Passing Interface (MPI). The goals of MPICH2 are to provide an MPI implementation for important platforms, including clusters, SMPs, and massively parallel processors. It also provides a tool for MPI implementation research and for developing new and better parallel programming environments. DISADVANTAGES:  Threat to the confidentiality of the data shared among the nodes in the computing clusters of open network.  Anybody can access to the data in an open network of computer clusters. Due to this the consistency of the data received by the processes in the network is low. This may cause to process failure. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 3.
     Unauthorized accessto the security-sensitive messages by untrusted processes can lead to security breaches. PROPOSED SYSTEM: The proposed system is ES-MPICH2 framework implemented based on the MPICH2. Inthis to provide the data confidentiality we are providing security for MPI protocol by encrypting and decrypting the messages sent among the computing nodes. Encryption algorithms are integrated into the MPICH2 library at communication channel level of the MPICH2. ADVANTAGES:  Provides security for the data shared among the computing nodes by implementing the encryption and decryption algorithms.  By using the block ciphers the integrity of data is maintained.  The data shared among the nodes in the computer cluster are made confidential without changing the source code of applications that are runs under the MPI. ALGORITHM USED: 1. AES (Advanced Encryption Standard) 2. SHA -1 Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 4.
    ARCHITECTURE DIAGRAM: SYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 1 Network Interface Card (NIC) Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS .Net Framework 2.0 MS Visual Studio.Net 2005 Internet Information Server (IIS) MS SQL Server 2000 Windows Installer 3.1 Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 5.
    APPLICATIONS: 1. Funds Transfer 2. Research Oriented Applications 3. Military Secret Sharing Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765