A Noble Security Analysis of Various Distributed Systems
Abstract
Distributed systems increased the performance of a system by allowing applications to be processed in parallel. It helps us to share resources like printers, computers, storage facilities, data, files, web pages, networks, and thus it reduces the cost by shaing a single resource among several users instead of multiple resources. Since multiple machines communicate with each other through the network so they can be easily affected by the attacker and the full system should be corrupted. Users can access remote and local resources but they also may not aware of which machines their processes are running on. So, secure communiction of a distributed system is the most important issue. We need to analyze various vulnerabilities and can take proper protection of the system. In this paper, we discuss different architectural styles of distributed systems. Also, hold up different threads and protection mechanisms to get rid of these threads. The most focusing part of this paper is a summary of various distributed systems security. Here we hold up different distributed system security techniques like SSSE algorithm, BLCS architecture, ODIS algorithm, two eavesdropper model, dynamic cuckoo filter, etc. Finally, we summarize the full discussion like used methodology or architecture, advantages, disadvantages, accuracy, and future work in a table by which an author can easily gather knowledge about the summary of this paper. To better understanding, we show the result of various papers with a visual representation. I think it helps authors to know about security techniques and grow interested to work in this area.
Keywords
Full Text:
PDFReferences
Firdhous, M., Implementation of Security in Distributed Systems – A Comparative Study. International Journal of Computer Information Systems, 2011. 2(2).
Andrew S. Tanenbaum, M.V.S., Distributed Systems: Principles and Paradigms. 2006: Prentice Hall, Netherlands.
Guoqi Xie, G.Z., Safety Enhancement for Real-Time Parallel Applications in Distributed Automotive Embedded Systems: A Stable Stopping Approach. IEEE Transactions on Parallel and Distributed Systems, 2020. 31(9): p. 2067 - 2080.
Hui Yang, K.Z., Michel Kadoch, Yongshen Liang, Mohamed Cheriet, BLCS: Brain-Like Distributed Control Security in Cyber Physical Systems. IEEE Network, 2020. 34(3): p. 8-15.
Fangyu Li, R.X., Zengyan Wang, Lulu Guo, Jin Ye, Ping Ma, Wenzhan Song, Online Distributed IoT Security Monitoring With Multidimensional Streaming Big Data. IEEE Internet of Things Journal, 2020. 7(5): p. 4387 - 4394.
Ruyan Wang, H.L., Honggang Wang, Qing Yang, Dapeng Wu, Distributed Security Architecture Based on Blockchain for Connected Health: Architecture, Challenges, and Approaches. IEEE Wireless Communications, 2019. 26(6): p. 30-36.
Hussein, O., Identification of Threats and Vulnerabilities in Public Cloud-Based Apache Hadoop Distributed File System, in 15th International Computer Engineering Conference (ICENCO), 2019. 2019.
Kruglik, S., Security Issues in Distributed Storage Networks, in IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks. 2020.
S. B. Balaji, M.N.K., M. Vajha, V. Ramkumar, B. Sasidharan, P. V. Kumar, Erasure coding for distributed storage: an overview. Science China Information Sciences, 2018. 61(10).
Zelikovska, V.P.a.M.P.a.O.O., Information Security Management System in Distributed Information Systems, in IEEE International Conference on Advanced Trends in Information Theory (ATIT). 2019.
Zoltan Andras Lux, F.B., Sebastian Zickau and Sebastian Göndör, Full-text Search for Verifiable Credential Metadata on Distributed Ledgers, in Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 2019.
Allen Starke, J.M., Load Balanced Controller Association in Wireless Distributed SDNs, in IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). 2020, University of Florida.
Baozhou Luo and Wenjun Zhu, P.L.a.Z.H., Distributed Dynamic Cuckoo Filter System Based on Redis Cluster, in IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). 2018.
DOI: https://doi.org/10.52088/ijesty.v1i2.101
Article Metrics
Abstract view : 400 timesPDF - 182 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Sworna Akter, Md. Alamgir Hossain, Md. Mojibur Rahman Redoy Akanda