message passing interface

553 views

Published on

FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS Z Technologies, Chennai

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
553
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

message passing interface

  1. 1. A MESSAGE PASSING INTERFACE WITH ENHANCED SECURITYOBJECTIVE: The main objective of this system is to implement the security in theMessage Parsing Interface by integrating the encryption and decryption algorithmsin to the MPICH2 library with the standard MPI Interface.PROBLEM STATEMENT: The problems found in existing system as, Threat to the confidentiality ofthe data shared among the nodes in the computing clusters of open network.Anybody can access to the data in an open network of computer clusters. Due tothis the consistency of the data received by the processes in the network is low.This may cause to process failure. Unauthorized access to the security-sensitivemessages by entrusted processes can lead to security breaches.ABSTRACT: The Message Passing Interface (MPI) is a library specification for message-passing among the nodes of computer clusters of open network. Message PassingInterface (MPI) is a standardized and portable message-passing system designedby a group of researchers from academia and industry to function on a wide varietyof parallel computers.MPI is one of the most popular communication protocols forcluster computing environments. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  2. 2. A computer cluster consists of a set of loosely connected computers thatwork together so that in many respects they can be viewed as a single system.Clusters are usually deployed to improve performance and availability over that ofa single computer. But, the computer clusters are connected to the multiple numberof nodeswithin the network over the internet. It leads to the threat to theconfidentiality of the data shared among the multiple processes in the computercluster. This paper provides a systematic approach to improve the security in theMessage Parsing Interface by implementing the encryption and decryptionalgorithms to the MPI libraries without changing the application programming.EXISTING SYSTEM: MPICH2 is an implementation of the Message-Passing Interface (MPI). Thegoals of MPICH2 are to provide an MPI implementation for important platforms,including clusters, SMPs, and massively parallel processors. It also provides a toolfor MPI implementation research and for developing new and better parallelprogramming environments.DISADVANTAGES:  Threat to the confidentiality of the data shared among the nodes in the computing clusters of open network.  Anybody can access to the data in an open network of computer clusters. Due to this the consistency of the data received by the processes in the network is low. This may cause to process failure. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  3. 3.  Unauthorized access to the security-sensitive messages by untrusted processes can lead to security breaches.PROPOSED SYSTEM: The proposed system is ES-MPICH2 framework implemented based on theMPICH2. Inthis to provide the data confidentiality we are providing security forMPI protocol by encrypting and decrypting the messages sent among thecomputing nodes. Encryption algorithms are integrated into the MPICH2 library atcommunication channel level of the MPICH2.ADVANTAGES:  Provides security for the data shared among the computing nodes by implementing the encryption and decryption algorithms.  By using the block ciphers the integrity of data is maintained.  The data shared among the nodes in the computer cluster are made confidential without changing the source code of applications that are runs under the MPI.ALGORITHM USED: 1. AES (Advanced Encryption Standard) 2. SHA -1 Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  4. 4. ARCHITECTURE DIAGRAM:SYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 1 Network Interface Card (NIC) Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS .Net Framework 2.0 MS Visual Studio.Net 2005 Internet Information Server (IIS) MS SQL Server 2000 Windows Installer 3.1 Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  5. 5. APPLICATIONS: 1. Funds Transfer 2. Research Oriented Applications 3. Military Secret Sharing Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765

×