Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences. Rynge, M., Poehlman, W., L., Feltus, F., A., Vahi, K., Deelman, E., Mandal, A., Baldin, I., Bhide, O., Heiland, R., Welch, V., & Hill, R. In Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19), pages 1-8, 2019. Association for Computing Machinery (ACM). Paper doi abstract bibtex With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the integrity of the scientific data. When integrity is not preserved, computations can fail and result in increased computational cost due to reruns, or worse, results can be corrupted in a manner not apparent to the scientist and produce invalid science results. Technologies such as TCP checksums, encrypted transfers, checksum validation, RAID and erasure coding provide integrity assurances at different levels, but they may not scale to large data sizes and may not cover a workflow from end-to-end, leaving gaps in which data corruption can occur undetected. In this paper we explore an approach of assuring data integrity - considering either malicious or accidental corruption - for workflow executions orchestrated by the Pegasus Workflow Management System. To validate our approach, we introduce Chaos Jungle - a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors during data transfers and storage. In addition to controlled experiments with Chaos Jungle, we provide analysis of integrity errors that we encountered when running production workflows.
@inproceedings{
title = {Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences},
type = {inproceedings},
year = {2019},
pages = {1-8},
publisher = {Association for Computing Machinery (ACM)},
id = {6d46f628-0077-3408-b9f8-0c6201e5e7f8},
created = {2019-10-01T17:21:14.292Z},
accessed = {2019-09-11},
file_attached = {true},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2020-05-11T14:43:34.750Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Rynge2019},
private_publication = {false},
abstract = {With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the integrity of the scientific data. When integrity is not preserved, computations can fail and result in increased computational cost due to reruns, or worse, results can be corrupted in a manner not apparent to the scientist and produce invalid science results. Technologies such as TCP checksums, encrypted transfers, checksum validation, RAID and erasure coding provide integrity assurances at different levels, but they may not scale to large data sizes and may not cover a workflow from end-to-end, leaving gaps in which data corruption can occur undetected. In this paper we explore an approach of assuring data integrity - considering either malicious or accidental corruption - for workflow executions orchestrated by the Pegasus Workflow Management System. To validate our approach, we introduce Chaos Jungle - a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors during data transfers and storage. In addition to controlled experiments with Chaos Jungle, we provide analysis of integrity errors that we encountered when running production workflows.},
bibtype = {inproceedings},
author = {Rynge, Mats and Poehlman, William L. and Feltus, F. Alex and Vahi, Karan and Deelman, Ewa and Mandal, Anirban and Baldin, Ilya and Bhide, Omkar and Heiland, Randy and Welch, Von and Hill, Raquel},
doi = {10.1145/3332186.3332222},
booktitle = {Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19)}
}
Downloads: 0
{"_id":"nma4JM7W27PHs5Wwe","bibbaseid":"rynge-poehlman-feltus-vahi-deelman-mandal-baldin-bhide-etal-integrityprotectionforscientificworkflowdatamotivationandinitialexperiences-2019","authorIDs":[],"author_short":["Rynge, M.","Poehlman, W., L.","Feltus, F., A.","Vahi, K.","Deelman, E.","Mandal, A.","Baldin, I.","Bhide, O.","Heiland, R.","Welch, V.","Hill, R."],"bibdata":{"title":"Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences","type":"inproceedings","year":"2019","pages":"1-8","publisher":"Association for Computing Machinery (ACM)","id":"6d46f628-0077-3408-b9f8-0c6201e5e7f8","created":"2019-10-01T17:21:14.292Z","accessed":"2019-09-11","file_attached":"true","profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2020-05-11T14:43:34.750Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Rynge2019","private_publication":false,"abstract":"With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the integrity of the scientific data. When integrity is not preserved, computations can fail and result in increased computational cost due to reruns, or worse, results can be corrupted in a manner not apparent to the scientist and produce invalid science results. Technologies such as TCP checksums, encrypted transfers, checksum validation, RAID and erasure coding provide integrity assurances at different levels, but they may not scale to large data sizes and may not cover a workflow from end-to-end, leaving gaps in which data corruption can occur undetected. In this paper we explore an approach of assuring data integrity - considering either malicious or accidental corruption - for workflow executions orchestrated by the Pegasus Workflow Management System. To validate our approach, we introduce Chaos Jungle - a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors during data transfers and storage. In addition to controlled experiments with Chaos Jungle, we provide analysis of integrity errors that we encountered when running production workflows.","bibtype":"inproceedings","author":"Rynge, Mats and Poehlman, William L. and Feltus, F. Alex and Vahi, Karan and Deelman, Ewa and Mandal, Anirban and Baldin, Ilya and Bhide, Omkar and Heiland, Randy and Welch, Von and Hill, Raquel","doi":"10.1145/3332186.3332222","booktitle":"Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19)","bibtex":"@inproceedings{\n title = {Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences},\n type = {inproceedings},\n year = {2019},\n pages = {1-8},\n publisher = {Association for Computing Machinery (ACM)},\n id = {6d46f628-0077-3408-b9f8-0c6201e5e7f8},\n created = {2019-10-01T17:21:14.292Z},\n accessed = {2019-09-11},\n file_attached = {true},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2020-05-11T14:43:34.750Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Rynge2019},\n private_publication = {false},\n abstract = {With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the integrity of the scientific data. When integrity is not preserved, computations can fail and result in increased computational cost due to reruns, or worse, results can be corrupted in a manner not apparent to the scientist and produce invalid science results. Technologies such as TCP checksums, encrypted transfers, checksum validation, RAID and erasure coding provide integrity assurances at different levels, but they may not scale to large data sizes and may not cover a workflow from end-to-end, leaving gaps in which data corruption can occur undetected. In this paper we explore an approach of assuring data integrity - considering either malicious or accidental corruption - for workflow executions orchestrated by the Pegasus Workflow Management System. To validate our approach, we introduce Chaos Jungle - a toolkit providing an environment for validating integrity verification mechanisms by allowing researchers to introduce a variety of integrity errors during data transfers and storage. In addition to controlled experiments with Chaos Jungle, we provide analysis of integrity errors that we encountered when running production workflows.},\n bibtype = {inproceedings},\n author = {Rynge, Mats and Poehlman, William L. and Feltus, F. Alex and Vahi, Karan and Deelman, Ewa and Mandal, Anirban and Baldin, Ilya and Bhide, Omkar and Heiland, Randy and Welch, Von and Hill, Raquel},\n doi = {10.1145/3332186.3332222},\n booktitle = {Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning) (PEARC '19)}\n}","author_short":["Rynge, M.","Poehlman, W., L.","Feltus, F., A.","Vahi, K.","Deelman, E.","Mandal, A.","Baldin, I.","Bhide, O.","Heiland, R.","Welch, V.","Hill, R."],"urls":{"Paper":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d/file/0f576cab-74b2-e417-1be9-bd1f8e88b38e/Rynge_et_al___2019___Integrity_Protection_for_Scientific_Workflow_Data_Motivation_and_Initial_Experiences2.pdf.pdf"},"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"rynge-poehlman-feltus-vahi-deelman-mandal-baldin-bhide-etal-integrityprotectionforscientificworkflowdatamotivationandinitialexperiences-2019","role":"author","metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","creationDate":"2019-09-16T23:55:44.780Z","downloads":0,"keywords":[],"search_terms":["integrity","protection","scientific","workflow","data","motivation","initial","experiences","rynge","poehlman","feltus","vahi","deelman","mandal","baldin","bhide","heiland","welch","hill"],"title":"Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences","year":2019,"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}