Data Access Control In High-Performance Computing: Preventing Unauthorized Access To Sensitive Data In Shared Clusters

Authors

  • Mfon O. Esang Dept. of Computer Science Federal Polytechnic, Ukana
  • Engr. Imaobong O. Akpan Dept. of Mechanical Eng. Federal Polytechnic, Ukana
  • Tope G. Jimoh Dept. of Computer Science Federal Polytechnic, Ukan
  • Habeeb Ramoh Ajibola Dept. of Computer Science Federal Polytechnic, Ukana
  • Engr Ekerette Dan Dept. of Mechanical Eng. Federal Polytechnic, Ukana

Keywords:

Data Access, Machine learning, Control Mechanisms, HPC clusters, Access Control Policies, High-Performance Computing, Emerging Technologies

Abstract

High-Performance Computing (HPC) clusters are increasingly relied upon for processing large datasets, many of which contain sensitive information critical to research, industry, and government applications. Ensuring that access to such data is tightly controlled paramount to prevent unauthorized access, data breaches, and privacy violations. This paper explores various access control mechanisms and policies designed to secure sensitive data in shared HPC clusters. This paper also discusses the challenges, Control policy, and emerging technologies in the field of data access control for HPC, providing preference result for researchers, system administrators, and organizations operating HPC environments.

References

M. Eldred, A. Good and C. Adams (2015). A case study on data protection and security decisions in cloud HPC, IEEE 7th International Conference on Cloud Computing Technology and Science.

C. Vecchiola, S. Pandey, R. Buyya, (2009) High-Performance Cloud Computing: A View of Scientific Applications, Pervasive Systems, Algorithms, and Networks, 10th International Symposium on Pervasive Systems, and Networks.

M. Eldred, R. Mcavey (2015), Prepare for a Quantum Shift in Upstream Modelling, Gartner.

I. Foster and et al., (2017). “Computing just what you need: Online data analysis and reduction at extreme scales,” in Euro-Par 2017: Parallel Processing. Springer International Publishing, 2017

Dan Huang, Zhenlu Qin, Qing Liu, Norbert Podhorszki, Scott Klasky, (2022), A Comprehensive Study of In-Memory Computing on Large HPC Systems, https://www.sciencedirect.com/science/article/pii/S0743731522000387

Gerndt, M., Kranzlmüller, D. (eds.) (2006), HPCC 2006. LNCS, vol. 4208, p. 938. Springer, Heidelberg

Urvashi Chugh and Amit Chugh, (2010), Security in High Performance Computing, Springer-Verlag Berlin Heidelberg, pp. 552–556

Al-Jody, Taha (2021) Bearicade: A Novel High-Performance Computing User and Security Management System Augmented with Machine Learning Technology. Doctoral thesis, University of Huddersfield.

Chen, Y., Zheng, Q., and Yang, H. (2017). A kind of university HPC platform security balance method based on the barrel theory. In Proceedings of the 29th Chinese Control and Decision Conference, CCDC 2017, pages 3708–3713. Institute of Electrical and Electronics Engineers Inc.

Dirk Pleitera, Sebastien Varretteb, Ezhilmathi Krishnasamyb, Enver Özdemirc, Michał Pilcd (2021). Security in an evolving European HPC Ecosystem. Partnership for Advanced Computing in Europe. Available online at www.prace-ri.eu

Sean Peisert (2017). Security in High Performance Computing Environments. Reviewed article on Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems. COMMUNICATIONS OF THE ACM, vol 60, No. 9.

Sushil Jajodia, George Cybenko V.S. Subrahmanian, Vipin Swarup Cliff Wang, Michael Wellman (2020). Adaptive Autonomous Secure Cyber Systems. © Springer Nature Switzerland AG. ISBN 978-3-030-33431-4 ISBN 978-3-030-33432-1 (eBook) https://doi.org/10.1007/978-3-030-33432-1

Subhash Chandra Patel, Lokendra Singh Umrao, Ravi Shankar Singh (2012). Policy- based Access Control in Cloud Computing. Conference: International conference on Artificial Intelligent and Soft Computing. https://www.researchgate.net/publication/236578717

M. Blanc, J.-F. Lalande (2013) Improving Mandatory Access Control for HPC clusters. Future Generation Computer Systems 29 (2013) 876–885. www.elsevier.com/locate/fgcs

Al-Jody, Taha (2021) Bearicade: A Novel High-Performance Computing User and Security Management System Augmented with Machine Learning Technology. Doctoral thesis, University of Huddersfield.

Keke Chen (2022). Confidential High-Performance Computing in the Public Cloud. IEEE Computer Society.

L. Hu, S. Ying, X. Jia, and K. Zhao, “Towards an approach of semantic access control for cloud computing,” LNCS Cloud Computing, vol. 5931, p. 145156, 2009. 28. S. D. Capitani, S. Foresti, S. Jajodia,

S. Paraboschi, and P. Samarati,“Over-encryption: Management of access control evolution on outsourced data,” in Proceeding at International Conference on VeryLarge Databases, 2007. 29. S. Yu,

C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud omputing,” in 29th IEEE International Conference on Computer Communications, 2010

Shen, H. B., and Hong, F. (2006). An attribute-based access control model for web services. In Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT’06. (pp. 74–79).

Khan, M. F. F., and Sakamura, K. (2015). Fine-grained access control to medical records in digital healthcare enterprises. In International Symposium on, Networks, Computers and Communications (ISNCC), 2015 (pp. 1–6). IEEE.

Msahli, M., Chen, X., and Serhrouchni, A. (2014). Towards a finegrained access control for cloud. In IEEE 11th International Conference on, e-Business Engineering (ICEBE), 2014 (pp. 286–291).

Fan, Y., Han, Z., Liu, J., and Zhao, Y. (2009). A mandatory access control model with enhanced flexibility. In International Conference on Multimedia Information Networking and Security, MINES’09. (Vol. 1, pp. 120–124). IEEE

Blanc, M., and Lalande, J. F. (2013). Improving mandatory access control for HPC clusters. Future Generation Computer Systems, 29(3), 876–885.

Downloads

Published

2024-02-23

How to Cite

Mfon O. Esang, Engr. Imaobong O. Akpan, Tope G. Jimoh, Habeeb Ramoh Ajibola, & Engr Ekerette Dan. (2024). Data Access Control In High-Performance Computing: Preventing Unauthorized Access To Sensitive Data In Shared Clusters. International Journal of Agribusiness and Sustainable Development Research, 1(1), 38–45. Retrieved from https://gscjournal.com/IJASDR/article/view/16

Issue

Section

Articles

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.