Accessing the Data Security Model in Distributed System
Manu Agarwal and Gaurav Agarwal. Article: Accessing the Data Security Model in Distributed System. International Journal of Applied Information Systems 1(4):11-14, February 2012. BibTeX
@article{key:article, author = "Manu Agarwal and Gaurav Agarwal", title = "Article: Accessing the Data Security Model in Distributed System", journal = "International Journal of Applied Information Systems", year = 2012, volume = 1, number = 4, pages = "11-14", month = "February", note = "Published by Foundation of Computer Science, New York, USA" }
Abstract
This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of authorization, authentication, encryption, access control.
Reference
- George Coulouris,Jean Dollimore and Tim Kindberg, Distributed System- Concepts and design, 4th ed. London England: Addison- Wesley 2005.
- Andrew S Tnaenbaum and Maarten van Steen, Distributed system: Principal and Paradigms,2nd ed. Upper Saddle River,NJ,USA:Pearson Higher Education, 2007
- Mark Baker and Rajkumar Buyva, “Cluster Computing: Architecture and System- Volume 2 Prentice Hall, 1999, ch.1 pp-3-47
- Chee Shin Yeo, “Utility-based Resource management for Clusters Computing,” the university of Melbourne,Australia,PhD Thesis 2008.
- Rajkumar Buyya and Srikumar Venugopal, “Market Oriented Computing and Global Grids: An Introduction,” in Market Oriented Grid and Utility Computing, Rajkumar Buyya and Kris Bubendorfer, Eds Hoboken,NJ, USA:John Wiley & Sons,Inc,2010,ch 1,pp.3-27
- Yuchong Hu, Yimlong Xu,Xiaozhao Wang,Cheng Zhan, and Pei Li, “ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding,” IEEE journal on Selected Areas in Communication,vol. 28,no. 2,pp. 268-276, Feburary 2010
- Ali Safari Mamaghani,MostafaMahi,Mohammad Reza Meybodi,and Mohammad Hosseinzadeh Moghaddam, “ A Novel Evolutionary Algorithm for Solving Static Data Allocation Problem in Distributed Database System,” in Second International Confrence on Network Application,Protocols and Services(NETAPPS),Alor Setar, Kedah,2010,pp.14-19
- Wei Li and Rayford B Vaughn, “ Cluster Security Reaserch Involving the Modeling of Network Exploitations Using Exploitation Graphs,” in Sixth IEEE International Symposium on Cluster Computing and the Grid Workshop(CCGRIDW’06), Singapore,2006,pp.26-36.
- Yuri Demchenko, Cees De Laat, Oscar Koeroo, and David Groep, “ Re-thinking Grid Security Architecture,” in IEEE fourth International Confrence on eScience, 2008(eScience ’08), Indianapolis, IN, USA,2008,pp. 79-86
- Ragib Hasan,Suvda Myagmar Adam J Lee, and William Yurcik, “Toward a threat model for storage system,” in Proceedings of 2005 ACM Workshop on Storage Security and Survivalist (StorageSS’05),FairFax,VA,USA,2005,pp.94-102
- Zakaria Suliman ZUbi, “ On Distributed Database Security Aspects,” In International Confrence on Multimedia Computing and System, Ouarzazate, Morocco,2009, pp.231-235
- White,D (1999), Distributed system security, DBMS, 10, pp. 44-48.
- Amoroso, E. (1994), Fundamentals of Computer Security Technology,ch. 7, Prentice-Hall, Englewood Cliffs, NJ.
Keywords
Distributed System, Data Security, Authentication, Authorization