Font Size: a A A

Idle Node Dominated Secure Memory Sharing System

Posted on:2023-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:B TangFull Text:PDF
GTID:2568307097979079Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology,the advent of short video era puts forward higher requirements for data storage and processing.A distributed storage system coordinates storage resources in a cluster through a network.It not only solves the problem of insufficient storage resources on a single node,but also alleviates the problem of low utilization of idle resources.The system based on big data and artificial intelligence not only has high requirements for data storage,but also has a large demand for memory.RDMA(Remote Direct memory Access)technology offloads the data processing to the network card and accesses the memory data directly through the DMA bus,reducing the CPU footprint and avoiding multiple memory copies.The distributed memory sharing system based on RDMA network is an effective solution to solve the shortage of single node memory resources.Existing memory sharing systems are dominated by busy nodes with insufficient resources in the cluster.As a result,busy nodes become busier and idle resources are not properly utilized.In addition,RDMA technology achieves high bandwidth but also brings data security problems,existing systems rarely consider the security of shared data from the system level.In this paper,a secure memory sharing system based on idle nodes is proposed,in which the idle nodes with abundant spare resources do most of the memory management work to avoid the situation of busy nodes becoming busier.In addition,at the system level,shared data stored in the memory of the remote node does not have security risks.The main research of this paper is as follows:(1)Propose a memory sharing method dominated by idle nodes.Decentralized management mode dominated by idle nodes is adopted to coordinate the memory resources in the cluster.Idle nodes proactively synchronize cluster status,select remote nodes to be mapped to memory blocks,and initiate mapping requests.Busy nodes only need to perform simple metadata management operations.The method dominated by idle nodes can reduce the consumption of idle resources in the cluster and improve the overall resource utilization efficiency of the cluster.(2)Design a lightweight shared data encryption module.In a system dominated by idle nodes,securing the shared data is essential for proper system operation.Based on the lightweight symmetric encryption method,the system encrypts the data content before writing to the remote memory through RDMA READ operation,ensuring that the data stored in the remote node is the encrypted content.Lightweight encryption will not bring too much performance overhead to the node at the same time,from the system level to alleviate RDMA network data security problem.(3)To achieve SecActiveswap,a safe memory sharing system dominated by idle nodes,by which idle nodes in the cluster can synchronize cluster status information without additional overhead of other nodes through RDMA unilateral operation.In addition,the message mechanism and metadata synchronization strategy dominated by idle nodes are added,and corresponding functional modules are realized.Lightweight shared data encryption modules are realized based on two symmetric encryption methods.Experimental results show that the CPU utilization of busy nodes is reduced by 59.34%in large-scale computing scenarios,and the total completion time is reduced by 2.22% in graph processing scenarios.In the real graph processing application scenario,the symmetric encryption method only needs microsecond overhead to provide shared data security protection for distributed memory sharing system based on RMDA.
Keywords/Search Tags:Idle Node Dominance, Distributed Memory Systems, Shared Data Security
PDF Full Text Request
Related items