High performance computing is widely used for large-scale simulations, designs and analysis of critical problems especially through the use of cloud computing systems nowadays because cloud computing provides ubiquitous, on-demand computing capabilities with large variety of hardware configurations including GPUs and FPGAs that are highly used for high performance computing. However, it is well known that inefficient management of such systems results in excessive power consumption affecting the budget, cooling challenges, as well as reducing reliability due to the overheating and hotspots. Furthermore, considering the latest trends in the attack scenarios and crypto-currency based intrusions, security has become a major problem for high performance computing. Therefore, to address both challenges, in this paper we present an autonomic management methodology for both security and power/performance. Our proposed approach first builds knowledge of the environment in terms of power consumption and the security tools' deployment. Next, it provisions virtual resources so that the power consumption can be reduced while maintaining the required performance and deploy the security tools based on the system behavior. Using this approach, we can utilize a wide range of secure resources efficiently in HPC system, cloud computing systems, servers, embedded systems, etc.
[1]
Ragunathan Rajkumar,et al.
Critical power slope: understanding the runtime effects of frequency scaling
,
2002,
ICS '02.
[2]
Farah Fargo,et al.
Autonomic Secure HPC Architecture Against Power Attacks
,
2018,
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[3]
Xiaorui Wang,et al.
Cluster-level feedback power control for performance optimization
,
2008,
2008 IEEE 14th International Symposium on High Performance Computer Architecture.
[4]
Michael Kistler,et al.
The case for power management in web servers
,
2002
.
[5]
Dong Seong Kim,et al.
Intrusion detection system
,
2020,
International Journal of Engineering and Techniques.
[6]
Samuel Greengard,et al.
Cybersecurity gets smart
,
2016,
Commun. ACM.