Open Access Open Access  Restricted Access Subscription or Fee Access

A Study about Security Issues and its Solution Directives in Distributed Systems

B. Santhiya, S. Sarathambekai

Abstract


A research issue in distributed systems is the development of secured and trusted systems in the distributed environment. Several approaches like authentication based approaches, development of trust based models, access control based approaches etc, such security aspects of the distributed systems have been discussed. Apart from this, many research lines about secure distributed systems like study about security issues associated with its respective solution directives to circumvent those issues in distributed systems have been discussed. Finally the security issues and the solutions are summarized.


Keywords


Distributed System Security, Cryptography, Quorum, Authentication, Mobile Agent.

Full Text:

PDF

References


M. Shehab, A. Ghafoor, E. Bertino, Secure collaboration in a media-tor free distributed environment, IEEE Transactions on Parallel and Distributed Systems, vol. 19, no.10, pp.1338-1351, 2010.

S. Pallickara, J. Ekanayake, G. Fox, A scalable approach for the secure and authorized tracking of the availability of entities in distributed systems, IEEE International Parallel and distributed Processing sym-posium , pp. 1-10, 2007

R. Anderson, Security engineering: a guide to building dependable distributed systems, Wiley, 2010.

Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya, "Distributed Systems and Recent Innovations: Challenges and Benefits," InfoNet Magazine, vol. 16, no. 3, September 2006.

Zhidong Shen and Xiaoping Wu, "The Protection for Private Keys in Distributed Computing System Enabled by Trusted Computing Platform," in International Conference On Computer Design And Appliations (ICCDA 2010), Qinhuangdao, Hebei, China, 2010, pp. 576-580.

George Coulouris, Jean Dollimore, and Tim Kindberg, Distributed Systems - Concepts and Design, 4th ed. London, England: Addison - Wesley, 2005.

Andrew S Tanenbaum and Maarten van Steen, Distributed Systems: Principles and Paradigms, 2nd ed. Upper Saddle River, NJ, USA: Pearson Higher Education, 2007.

Robert Rehrig et al., "Repurposing Commodity Hardware for use as Assistive Technologies," in RESNA&Annual&Conference, Las Vegas, NV, USA, 2010, pp. 1-5.

Chee Shin Yeo, "Utility-based Resource Management for Cluster Computing," The University of Melbourne, Melbourne, Australia, PhD Thesis 2008.

Darlan K. E De Carvalho, Paulo R.M Lyra, and Ramiro B Willmersdorf, "A First Step towards a Petroleum Reservoir Simulator Using an Edge-Based Unstructured Finite Volume Formulation," in 2nd Brazilian R & D Congress on Oil and Gas, Rio de Janeiro, Brazil, 2003.

Ronald Scrofano, Maya B Gokhale, Frans Trouw, and Viktor K Prasanna, "Accelerating Molecular Dynamics Simulations with Reconfigurable Computers," IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 6, pp. 764-778, June 2008.

Weitao Sun, Jiwu Shu, and Weimin Zheng, "Parallel Seismic Propagation Simulation in Anisotropic Media by Irregular Grids Finite Difference Method on PC Cluster," in Computational Science and Its Applications – ICCSA 2005, Osvaldo Gervasi et al., Eds. Berlin / Heidelberg, Germany: Springer, 2005, pp. 762-771.

Tao Xie and Xiao Qin, "Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters," IEEE Transactions on parallel and distributed Systems, vol. 19, no. 5, pp. 682-697, May 2008.

Wei Li and Rayford B Vaughn, "Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs," in Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops (CCGRIDW'06), Singapore, 2006, pp. 26-36.

Zhongqiu Jiang, Shu Yan, and Liangmin Wang, "Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attacks," in 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. , Beijing, China, 2009, pp. 1-4.

Yuri Demchenko, Cees de Laat, Oscar Koeroo, and David Groep, "Re-thinking Grid Security Architecture," in IEEE Fourth International Conference on eScience, 2008 (eScience '08), Indianapolis, IN, USA, 2008, pp. 79-86.

Yuri Demchenko, Cees de Laat, Oscar Koeroo, and David Groep, "Re-thinking Grid Security Architecture," in IEEE Fourth International Conference on eScience, 2008 (eScience '08), Indianapolis, IN, USA, 2008, pp. 79-86.

Quowen Xing, Shengjun Xue, and Fangfang Liu, "Research of Grid Security Authentication Model," in International Conference on Computer Application and System Modeling (ICCASM), vol. 1, Taiyuan, Shanxi, China, 2010, pp. 78-80.

Ragib Hasan, Suvda Myagmar, Adam J Lee, and William Yurcik, "Toward a threat model for storage systems," in Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS '05), FairFax, VA, USA, 2005, pp. 94-102.

Theodoros K Dikaliotis, Alexandros G Dimakis, and Tracey Ho, "Security in distributed storage systems by communicating a logarithmic number of bits," in IEEE International Symposium on Information Theory Proceedings (ISIT),, Austin, TX, USA, 2010, pp. 1948 - 1952.

Navdeep Kaur, Rajwinder Singh, A K Sarje, and Manoj Misra, "Performance evaluation of secure concurrency control algorithm for multilevel secure distributed database system," in International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, NV, USA, 2005, pp. 249-254.

Zakaria Suliman Zubi, "On distributed database security aspects," in International Conference on Multimedia Computing and Systems, Ouarzazate, Morocco, 2009, pp. 231-235.


Refbacks

  • There are currently no refbacks.