Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Dissertations and Theses

2020

Cloud computing

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen Mar 2020

Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen

Dissertations and Theses

Optimizing scientific application performance in HPC environments is a complicated task which has motivated the development of many performance analysis tools over the past decades. These tools were designed to analyze the performance of a single parallel code using common approaches such as message passing (MPI), multithreading (OpenMP), acceleration (CUDA), or a hybrid approach. However, current trends in HPC such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications and scientific workflows, have created gaps that these performance tools do not cover, particularly involving end-to-end data movement through an end-to-end HPC workflow comprising multiple …


Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot Mar 2020

Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot

Dissertations and Theses

Encryption is an important tool for protecting data, especially data stored in the cloud. However, standard encryption techniques prevent efficient search. Searchable encryption attempts to solve this issue, protecting the data while still providing search functionality. Retaining the ability to search comes at a cost of security, performance and/or utility.

An important practical aspect of utility is compatibility with legacy systems. Unfortunately, the efficient searchable encryption constructions that are compatible with these systems have been proven vulnerable to attack, even against weaker adversary models.

The goal of this work is to address this security problem inherent with efficient, legacy compatible …