Back

Minisymposium Presentation

The LUMI Case: Towards High Performance Confidential Computing with Containers

Monday, June 3, 2024
14:30
-
15:00
CEST
Climate, Weather and Earth Sciences
Climate, Weather and Earth Sciences
Climate, Weather and Earth Sciences
Chemistry and Materials
Chemistry and Materials
Chemistry and Materials
Computer Science and Applied Mathematics
Computer Science and Applied Mathematics
Computer Science and Applied Mathematics
Humanities and Social Sciences
Humanities and Social Sciences
Humanities and Social Sciences
Engineering
Engineering
Engineering
Life Sciences
Life Sciences
Life Sciences
Physics
Physics
Physics

Presenter

Timothy
Dykes
-
HPE

Tim is a Research Engineer in the HPE HPC/AI EMEA Research Lab, where he collaborates with EMEA scientific and technical communities on a variety of supercomputing research and development projects. He holds a Ph.D. in high performance scientific visualisation from the University of Portsmouth, U.K., and his primary research interests focus on computer architecture, performance portability, programming models for heterogeneous high performance computing, and scientific visualisation.

Description

Tim Dykes and Martin Matthiesen will discuss the topic of confidential high performance computing from both the platform vendor and operational perspectives in the context of Europe's HPC Flagship LUMI. The talk will initially outline the requirement for secure workloads in HPC, highlighting the challenges presented by system architecture, system software, applications, typical usage patterns, threat models, and common misconceptions surrounding confidentiality and data processing. We will briefly cover examples of existing approaches to support confidential workloads on HPC systems, and then present an overview of a joint effort to develop an end-to-end container-based technology prototype for remote workload execution on Cray EX supercomputers. We consider protection from in-storage, in-flight, and in-execution access by third parties through container encryption, secure sub-networks, and a fully attested hardware and software stack, without requiring any application modification. We will discuss our experiences building this technology from both the platform vendor and data-center operator perspectives, and contrast with other approaches also in use. We will summarise highlighting future work and outstanding challenges to be solved.

Authors