Application-Aware Reliability and Security: The Trusted ILLIAC Approach

R. Iyer
{"title":"Application-Aware Reliability and Security: The Trusted ILLIAC Approach","authors":"R. Iyer","doi":"10.1109/NCA.2006.15","DOIUrl":null,"url":null,"abstract":"Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a truly trustworthy system, the designer must find ways to mitigate (avoid and tolerate) against accidental errors and malicious attacks. Trusted ILLIAC ^1 is a reliable and secure clustercomputing platform being built at the University of Illinois Coordinated Science Laboratory (CSL) and Information Trust Institute (ITI), involving faculty from Electrical and Computer Engineering and Computer Science Departments. Trusted ILLIAC is intended to be a large, demonstrably trustworthy cluster-computing system to support what is variously referred to as on-demand/utility computing or adaptive enterprise computing. Such systems require that a significant number of applications co-exist and share hardware/software resources using a variety of containment boundaries. Current solutions aim at providing hardware and software solutions that can only be described as a one-size-fits-all approaches. Today’s environments are complex, expensive to implement, and nearly impossible to validate. The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance. A promising approach lies in developing a new set of application-aware methods that provide customized levels of trust (specified by the application) enforced using an integrated approach involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware. Our approach is to demonstrate such a set of integrated techniques that span entire system hierarchy: processor hardware, operating system, middleware, and application.","PeriodicalId":114675,"journal":{"name":"IEEE International Symposium on Network Computing and Applications","volume":"176 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Symposium on Network Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2006.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a truly trustworthy system, the designer must find ways to mitigate (avoid and tolerate) against accidental errors and malicious attacks. Trusted ILLIAC ^1 is a reliable and secure clustercomputing platform being built at the University of Illinois Coordinated Science Laboratory (CSL) and Information Trust Institute (ITI), involving faculty from Electrical and Computer Engineering and Computer Science Departments. Trusted ILLIAC is intended to be a large, demonstrably trustworthy cluster-computing system to support what is variously referred to as on-demand/utility computing or adaptive enterprise computing. Such systems require that a significant number of applications co-exist and share hardware/software resources using a variety of containment boundaries. Current solutions aim at providing hardware and software solutions that can only be described as a one-size-fits-all approaches. Today’s environments are complex, expensive to implement, and nearly impossible to validate. The challenge is to provide an application-specific level of reliability and security in a totally transparent manner, while delivering optimal performance. A promising approach lies in developing a new set of application-aware methods that provide customized levels of trust (specified by the application) enforced using an integrated approach involving reprogrammable hardware, enhanced compiler methods to extract security and reliability properties, and the support of configurable operating system and middleware. Our approach is to demonstrate such a set of integrated techniques that span entire system hierarchy: processor hardware, operating system, middleware, and application.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
应用感知的可靠性和安全性:可信的ILLIAC方法
安全性和可靠性是构建高度可信系统的关键属性。系统安全违规(例如,未经授权的特权访问或对数据完整性的损害)和可靠性故障可能由硬件问题(瞬态或间歇)、软件错误、资源耗尽、环境条件或这些因素之间的任何复杂交互引起。为了构建一个真正值得信赖的系统,设计师必须找到减轻(避免和容忍)意外错误和恶意攻击的方法。可信ILLIAC ^1是一个可靠和安全的集群计算平台,由伊利诺伊大学协调科学实验室(CSL)和信息信任研究所(ITI)建立,涉及电气与计算机工程和计算机科学系的教师。可信的ILLIAC旨在成为一个大型的、明显值得信赖的集群计算系统,以支持各种称为按需/效用计算或自适应企业计算的东西。这样的系统需要大量的应用程序共存,并使用各种包含边界共享硬件/软件资源。当前的解决方案旨在提供硬件和软件解决方案,这些解决方案只能被描述为一刀切的方法。今天的环境很复杂,实现起来很昂贵,而且几乎不可能验证。挑战在于以完全透明的方式提供特定于应用程序的可靠性和安全性级别,同时提供最佳性能。一种很有前景的方法是开发一组新的应用程序感知方法,这些方法提供自定义的信任级别(由应用程序指定),使用集成方法强制执行,包括可重新编程的硬件、增强的编译器方法以提取安全性和可靠性属性,以及对可配置操作系统和中间件的支持。我们的方法是演示一组跨越整个系统层次结构的集成技术:处理器硬件、操作系统、中间件和应用程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Message from the program chairs Keynote: Evolving Systems for Situational Awareness Message from the steering committee and general chairs A Low-Complexity Fault-Tolerant Document Storage System IPv4+6
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1