Towards securing data transfers against silent data corruption

B Charyyev, A Alhussen, H Sapkota… - 2019 19th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Scientific applications generate large volumes of data that often needs to be moved between
geographically distributed sites for collaboration or backup which has led to a significant …

Globus service enhancements for exascale applications and facilities

W Zheng, J Kordas, TJ Skluzacek… - … Journal of High …, 2024 - journals.sagepub.com
Many extreme-scale applications require the movement of large quantities of data to, from,
and among leadership computing facilities, as well as other scientific facilities and the home …

RIVA: Robust integrity verification algorithm for high-speed file transfers

B Charyyev, E Arslan - IEEE Transactions on Parallel and …, 2020 - ieeexplore.ieee.org
End-to-end integrity verification is designed to protect file transfers against silent data
corruption by comparing checksum of files at source and destination end points using …

A low-overhead integrity verification for big data transfers

E Arslan, A Alhussen - … Conference on Big Data (Big Data), 2018 - ieeexplore.ieee.org
The amount of data generated by scientific and commercial applications is growing at an
ever-increasing pace. This data is often moved between geographically distributed sites for …

Integrity protection for scientific workflow data: Motivation and initial experiences

M Rynge, K Vahi, E Deelman, A Mandal… - Proceedings of the …, 2019 - dl.acm.org
With the continued rise of scientific computing and the enormous increases in the size of
data being processed, scientists must consider whether the processes for transmitting and …

Accelerating I/O performance of ZFS-based Lustre file system in HPC environment

J Bang, C Kim, EK Byun, H Sung, J Lee… - The Journal of …, 2023 - Springer
To meet increasing data access performance demands of applications run on high-
performance computing (HPC) systems, an efficient design of HPC storage file system is …

TPBF: Two-Phase Bloom-Filter-Based End-to-End Data Integrity Verification Framework for Object-Based Big Data Transfer Systems

P Kasu, P Hamandawana, TS Chung - Mathematics, 2022 - mdpi.com
Computational science simulations produce huge volumes of data for scientific research
organizations. Often, this data is shared by data centers distributed geographically for …

CRBF: Cross-Referencing Bloom-Filter-Based Data Integrity Verification Framework for Object-Based Big Data Transfer Systems

P Kasu, P Hamandawana, TS Chung - Applied Sciences, 2023 - mdpi.com
Various components are involved in the end-to-end path of data transfer. Protecting data
integrity from failures in these intermediate components is a key feature of big data transfer …

Concurrent and robust end-to-end data integrity verification scheme for flash-based storage devices

H Kim, I Hwang, J Lee, HY Yeom, H Sung - IEEE Access, 2022 - ieeexplore.ieee.org
The amount of data generated by scientific applications on high-performance computing
systems is growing at an ever-increasing pace. Most of the generated data are transferred to …

Towards generalizable network anomaly detection models

M Arifuzzaman, S Islam, E Arslan - 2021 IEEE 46th conference …, 2021 - ieeexplore.ieee.org
Finding the root causes of network performance anomalies is critical to satisfy the quality of
service requirements. In this paper, we introduce machine learning (ML) models to process …