Bonsai: Balanced Lineage Authentication
Ashish Gehani
Bonsai:Balanced Lineage Authentication – p. 1/19
Bonsai: Balanced Lineage Authentication Ashish Gehani - - PowerPoint PPT Presentation
Bonsai: Balanced Lineage Authentication Ashish Gehani Bonsai:Balanced Lineage Authentication p. 1/19 What is data lineage ? Output Operation Input 1 Input n (a) Primitive operation (b) Compound operation tree Bonsai:Balanced Lineage
Ashish Gehani
Bonsai:Balanced Lineage Authentication – p. 1/19
Output Operation Input 1 Input n
(a) Primitive operation (b) Compound operation tree
Bonsai:Balanced Lineage Authentication – p. 2/19
Bonsai:Balanced Lineage Authentication – p. 3/19
Bonsai:Balanced Lineage Authentication – p. 4/19
myGrid - Biology Grid workflows
Bonsai:Balanced Lineage Authentication – p. 5/19
Bonsai:Balanced Lineage Authentication – p. 6/19
Bonsai:Balanced Lineage Authentication – p. 7/19
? Consumer Producer Output Input Input = Output
Bonsai:Balanced Lineage Authentication – p. 8/19
exec(), fork(), exit(), open(), close(), read(), write()
accessed, modified files
Process File 1 Read File 2 Read close()
close() File 3 Write Process execution Time close()
File 3 File 1 File 2 Owner
Bonsai:Balanced Lineage Authentication – p. 9/19
Net Address Inode Time 1 Signature Output Input n Executor Input
Bonsai:Balanced Lineage Authentication – p. 10/19
Bonsai:Balanced Lineage Authentication – p. 11/19
Steps 1 2 3 4 5 Workload Instruction 0.4 KB 3 KB 31 KB 253 KB 2 MB Research 0.2 KB 0.8 KB 2 KB 8 KB 29 KB Web 1 KB 39 KB 1 MB 29 MB 813 MB Windows 0.2 KB 0.8 KB 2 KB 9 KB 30 KB
Bonsai:Balanced Lineage Authentication – p. 12/19
Time (in ms) to read tree in open(): Steps 1 2 3 4 Workload Instruction 0.04 0.05 0.11 1.72 Research 0.05 0.05 0.04 0.04 Web 0.06 0.13 6.42 997.5 Windows 0.07 0.04 0.04 0.04 Time (in ms) to write tree in close(): Steps 1 2 3 4 Workload Instruction 0.20 0.28 0.32 0.84 Research 0.16 0.19 2.39 3.1 Web 0.16 0.24 4.82 579.14 Windows 0.16 0.50 5.34 3.17
Bonsai:Balanced Lineage Authentication – p. 13/19
Bonsai:Balanced Lineage Authentication – p. 14/19
Workload Storage Instruction 0.4 KB Research 0.2 KB Web 1 KB Windows 0.2 KB
Bonsai:Balanced Lineage Authentication – p. 15/19
Algorithm : CHECKLINEAGE(D) {E, S, O, I1, . . . , In} ← GETROOT(D) OUTPUT(E) PE ← PKILOOKUP(E) if I1, . . . , In = {} then
Result ← VERIFY(PE, S, E, O) if Result = FALSE then CheckFailed else
Result ← VERIFY(PE, S, E, O|I1| . . . |In) if Result = TRUE then
do CHECKLINEAGE(Ii) ← − Reliability drops else CheckFailed
Bonsai:Balanced Lineage Authentication – p. 16/19
Bonsai:Balanced Lineage Authentication – p. 17/19
Pruned levels λ Stored locally Pruned − must be recovered from remote node
Bonsai:Balanced Lineage Authentication – p. 18/19
Bonsai:Balanced Lineage Authentication – p. 19/19