Font Size: a A A

Research On Key Technology Of Secure Environment Of Users In Supercomputer System

Posted on:2017-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:B K YangFull Text:PDF
GTID:2428330569499015Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As nowadays society has higher and higher requirements of computing time and calculation,the supercomputers are more and more widely used in the corresponding industries.In order to facilitate users,supercomputers often provide access for users' connection,Users utilize VPN access to supercomputers' resouces via the Internet,some malicious behaviours can also affect the supercomputer systems via the Internet.For the convenience of jobs' running,there are massive numbers of user data and privacy stored on supercomputers.Because of systems' lacking of efficient security mechanism,after users' loginning to supercomputer systems,users' behaviours lack effective monitoring,thus users' data privacy cannot be secured.Besides,for the supercomputer' system security,the compute nodes are often not attached directly to the Internet.But for the reason of ensuring the users' normal service,the system usually provides login node for users to enter the system.Because of that all nodes of supercomputers are interconnected to each other,malicious users can establish the ?reverse tunnel? to bypass the systems' monitoring to make use of system resources illegally.This paper focus on the two problems of privacy preserving and nodes' connection validation,and it achieves the goal of privacy preserving through establishing private running environments,and it establishs the connection validation mechanism by adding the extra lightweight validation layer.It mainly contains the following works:First,this paper analyzes the architecture of supercomputers,the reason of privacy disclosure and the reason of node resources' illegal utilization after bypassing the monitoring.It establishs the private running environments through the operating-system mechanism,and it tests the private running environments' capabilities of privacy preserving and the effects on the systems after deploying the private running environments.Second,it makes a research of effective SSH connection ID-validation mechanisms under the circumstance of that system's performance cannot be effected too much,and it tests the effects on the system after adopting this mechanism.
Keywords/Search Tags:Supercomputer, privacy preserving, access control, validation mechanism
PDF Full Text Request
Related items