Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Accessing the Data Security Model in Distributed System

Manu Agarwal , Gaurav Agarwal Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Manu Agarwal and Gaurav Agarwal. Article: Accessing the Data Security Model in Distributed System. International Journal of Applied Information Systems 1(4):11-14, February 2012. BibTeX

    	author = "Manu Agarwal and Gaurav Agarwal",
    	title = "Article: Accessing the Data Security Model in Distributed System",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 4,
    	pages = "11-14",
    	month = "February",
    	note = "Published by Foundation of Computer Science, New York, USA"


This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of authorization, authentication, encryption, access control.


  1. George Coulouris,Jean Dollimore and Tim Kindberg, Distributed System- Concepts and design, 4th ed. London England: Addison- Wesley 2005.
  2. Andrew S Tnaenbaum and Maarten van Steen, Distributed system: Principal and Paradigms,2nd ed. Upper Saddle River,NJ,USA:Pearson Higher Education, 2007
  3. Mark Baker and Rajkumar Buyva, “Cluster Computing: Architecture and System- Volume 2 Prentice Hall, 1999, ch.1 pp-3-47
  4. Chee Shin Yeo, “Utility-based Resource management for Clusters Computing,” the university of Melbourne,Australia,PhD Thesis 2008.
  5. Rajkumar Buyya and Srikumar Venugopal, “Market Oriented Computing and Global Grids: An Introduction,” in Market Oriented Grid and Utility Computing, Rajkumar Buyya and Kris Bubendorfer, Eds Hoboken,NJ, USA:John Wiley & Sons,Inc,2010,ch 1,pp.3-27
  6. Yuchong Hu, Yimlong Xu,Xiaozhao Wang,Cheng Zhan, and Pei Li, “ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding,” IEEE journal on Selected Areas in Communication,vol. 28,no. 2,pp. 268-276, Feburary 2010
  7. Ali Safari Mamaghani,MostafaMahi,Mohammad Reza Meybodi,and Mohammad Hosseinzadeh Moghaddam, “ A Novel Evolutionary Algorithm for Solving Static Data Allocation Problem in Distributed Database System,” in Second International Confrence on Network Application,Protocols and Services(NETAPPS),Alor Setar, Kedah,2010,pp.14-19
  8. Wei Li and Rayford B Vaughn, “ Cluster Security Reaserch Involving the Modeling of Network Exploitations Using Exploitation Graphs,” in Sixth IEEE International Symposium on Cluster Computing and the Grid Workshop(CCGRIDW’06), Singapore,2006,pp.26-36.
  9. Yuri Demchenko, Cees De Laat, Oscar Koeroo, and David Groep, “ Re-thinking Grid Security Architecture,” in IEEE fourth International Confrence on eScience, 2008(eScience ’08), Indianapolis, IN, USA,2008,pp. 79-86
  10. Ragib Hasan,Suvda Myagmar Adam J Lee, and William Yurcik, “Toward a threat model for storage system,” in Proceedings of 2005 ACM Workshop on Storage Security and Survivalist (StorageSS’05),FairFax,VA,USA,2005,pp.94-102
  11. Zakaria Suliman ZUbi, “ On Distributed Database Security Aspects,” In International Confrence on Multimedia Computing and System, Ouarzazate, Morocco,2009, pp.231-235
  12. White,D (1999), Distributed system security, DBMS, 10, pp. 44-48.
  13. Amoroso, E. (1994), Fundamentals of Computer Security Technology,ch. 7, Prentice-Hall, Englewood Cliffs, NJ.


Distributed System, Data Security, Authentication, Authorization