CFP last date
16 December 2024
Reseach Article

Accessing the Data Security Model in Distributed System

by Manu Agarwal, Gaurav Agarwal
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 4
Year of Publication: 2012
Authors: Manu Agarwal, Gaurav Agarwal
10.5120/ijais12-450157

Manu Agarwal, Gaurav Agarwal . Accessing the Data Security Model in Distributed System. International Journal of Applied Information Systems. 1, 4 ( February 2012), 11-14. DOI=10.5120/ijais12-450157

@article{ 10.5120/ijais12-450157,
author = { Manu Agarwal, Gaurav Agarwal },
title = { Accessing the Data Security Model in Distributed System },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2012 },
volume = { 1 },
number = { 4 },
month = { February },
year = { 2012 },
issn = { 2249-0868 },
pages = { 11-14 },
numpages = {9},
url = { https://www.ijais.org/archives/volume1/number4/80-0157/ },
doi = { 10.5120/ijais12-450157 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:41:21.099892+05:30
%A Manu Agarwal
%A Gaurav Agarwal
%T Accessing the Data Security Model in Distributed System
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 4
%P 11-14
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of authorization, authentication, encryption, access control.

References
  1. George Coulouris,Jean Dollimore and Tim Kindberg, Distributed System- Concepts and design, 4th ed. London England: Addison- Wesley 2005.
  2. Andrew S Tnaenbaum and Maarten van Steen, Distributed system: Principal and Paradigms,2nd ed. Upper Saddle River,NJ,USA:Pearson Higher Education, 2007
  3. Mark Baker and Rajkumar Buyva, “Cluster Computing: Architecture and System- Volume 2 Prentice Hall, 1999, ch.1 pp-3-47
  4. Chee Shin Yeo, “Utility-based Resource management for Clusters Computing,” the university of Melbourne,Australia,PhD Thesis 2008.
  5. Rajkumar Buyya and Srikumar Venugopal, “Market Oriented Computing and Global Grids: An Introduction,” in Market Oriented Grid and Utility Computing, Rajkumar Buyya and Kris Bubendorfer, Eds Hoboken,NJ, USA:John Wiley & Sons,Inc,2010,ch 1,pp.3-27
  6. Yuchong Hu, Yimlong Xu,Xiaozhao Wang,Cheng Zhan, and Pei Li, “ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding,” IEEE journal on Selected Areas in Communication,vol. 28,no. 2,pp. 268-276, Feburary 2010
  7. Ali Safari Mamaghani,MostafaMahi,Mohammad Reza Meybodi,and Mohammad Hosseinzadeh Moghaddam, “ A Novel Evolutionary Algorithm for Solving Static Data Allocation Problem in Distributed Database System,” in Second International Confrence on Network Application,Protocols and Services(NETAPPS),Alor Setar, Kedah,2010,pp.14-19
  8. Wei Li and Rayford B Vaughn, “ Cluster Security Reaserch Involving the Modeling of Network Exploitations Using Exploitation Graphs,” in Sixth IEEE International Symposium on Cluster Computing and the Grid Workshop(CCGRIDW’06), Singapore,2006,pp.26-36.
  9. Yuri Demchenko, Cees De Laat, Oscar Koeroo, and David Groep, “ Re-thinking Grid Security Architecture,” in IEEE fourth International Confrence on eScience, 2008(eScience ’08), Indianapolis, IN, USA,2008,pp. 79-86
  10. Ragib Hasan,Suvda Myagmar Adam J Lee, and William Yurcik, “Toward a threat model for storage system,” in Proceedings of 2005 ACM Workshop on Storage Security and Survivalist (StorageSS’05),FairFax,VA,USA,2005,pp.94-102
  11. Zakaria Suliman ZUbi, “ On Distributed Database Security Aspects,” In International Confrence on Multimedia Computing and System, Ouarzazate, Morocco,2009, pp.231-235
  12. White,D (1999), Distributed system security, DBMS, 10, pp. 44-48.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed System Data Security Authentication Authorization