Security Issues in Distributed Computing System Models

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.

[1]  Mingwen Shao,et al.  Analysis on Grid Security Patterns Based on PKI , 2012 .

[2]  Sheila Anand,et al.  A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks , 2012, Comput. Sci. Rev..

[3]  Miguel Vargas-Lombardo,et al.  Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC) , 2012 .

[4]  Meenakshi Gupta,et al.  Security Requirements For Increasing Reliability In Grid Computing , 2013 .

[5]  M. M. A. Hashem,et al.  A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.

[6]  Rajkumar Buyya,et al.  Decentralization in Distributed Systems: Challenges, Technologies, and Opportunities , 2012 .

[7]  N. Kshetri Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .

[8]  V. Sankaranarayanan,et al.  Secure Selection of Multiple Resources Based on Virtual Private Network for Computational Grids , 2011 .

[9]  Ei Ei Mon,et al.  The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[10]  Manoj Kumar,et al.  Analysis of Different Security Issues and Attacks in Distributed System A-Review , 2013 .

[11]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[12]  Yang Xiao,et al.  A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.

[13]  Geert Deconinck,et al.  Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..

[14]  Abhijit Belapurkar,et al.  Distributed Systems Security: Issues, Processes and Solutions , 2009 .

[15]  Aphrodite Tsalgatidou,et al.  Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..

[16]  Alberto Montresor,et al.  Security and privacy issues in P2P streaming systems: A survey , 2011, Peer-to-Peer Netw. Appl..

[17]  Rolf Drechsler,et al.  Enhanced Formal Verification Flow for Circuits Integrating Debugging and Coverage Analysis , 2013, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[18]  Rashmi Bhatia,et al.  Grid Computing and Security Issues , 2013 .

[19]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[20]  James Li,et al.  A Survey of Peer-to-Peer Network Security Issues , 2008 .

[21]  Ali Mili,et al.  A cybersecurity model in cloud computing environments , 2013, J. King Saud Univ. Comput. Inf. Sci..

[22]  Mazleena Salleh,et al.  A Taxonomy and Survey of Distributed Computing Systems , 2015 .

[23]  A. Kazemi,et al.  Review of Grid Computing Security and Present a New Authentication Method for Improving Security , 2014 .

[24]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[25]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[26]  A. Bendahmane,et al.  Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.

[27]  Daan Broeder,et al.  A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.

[28]  Ting Yu,et al.  Towards secure dataflow processing in open distributed systems , 2009, STC '09.

[29]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[30]  S. A. Edalatpanah,et al.  Comparison of Cloud and Grid Computing , 2014 .

[31]  Sara Jeza Alotaibi,et al.  Using Fingerprint Recognition in a New Security Model for Accessing Distributed Systems , 2011 .

[32]  Anoopa Arya,et al.  Grid Computing: An Introduction , 2013 .

[33]  Xiao Qin,et al.  Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters , 2008, IEEE Transactions on Parallel and Distributed Systems.

[34]  Soumya Mathew,et al.  Securing Cloud from Attacks based on Intrusion Detection System , 2012 .

[35]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[36]  Geoff Holmes,et al.  Security and Data Accountability in Distributed Systems: A Provenance Survey , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[37]  Alptekin Küpçü,et al.  Single password authentication , 2013, Comput. Networks.

[38]  Anirban Chakrabarti Taxonomy of Grid Security Issues , 2007 .

[39]  Sugata Sanyal,et al.  Secure Authentication of Cloud Data Mining API , 2013, ArXiv.

[40]  Abdul Ghafoor Abbasi,et al.  Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.

[41]  Mohamed Firdhous Implementation of Security in Distributed Systems - A Comparative Study , 2012, ArXiv.

[42]  K. G. Srinivasa,et al.  Guide to High Performance Distributed Computing , 2015, Computer Communications and Networks.

[43]  Hristo Koshutanski,et al.  A Survey on Distributed Access Control Systems for Web Business Processes , 2009, Int. J. Netw. Secur..

[44]  Guillaume Pierre,et al.  Challenges in very large distributed systems , 2011, Journal of Internet Services and Applications.

[45]  Saurabh Maheshwari,et al.  Security Issues in Grid Computing , 2014 .

[46]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[47]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[48]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[49]  Amr Farouk,et al.  Authentication mechanisms in grid computing environment: Comparative study , 2012, 2012 International Conference on Engineering and Technology (ICET).

[50]  Rayford B. Vaughn,et al.  Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs , 2006 .

[51]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[52]  Ben Y. Zhao,et al.  Securing Structured Overlays against Identity Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[53]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[54]  Siani Pearson,et al.  Toward Accountability in the Cloud , 2011, IEEE Internet Computing.

[55]  H. Raghav Rao,et al.  Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..

[56]  Rajesh Kumar Tiwari,et al.  Addressing Security Challenges in Cloud Computing , 2013, ArXiv.

[57]  M. Kannan,et al.  A Study on System Virtualization Techniques , 2014 .

[58]  Eduardo Gómez-Sánchez,et al.  Cloud computing and education: A state-of-the-art survey , 2015, Comput. Educ..

[59]  Heinrich Theodor Vierhaus,et al.  Design and Test Technology for Dependable Systems-on-Chip , 2010 .

[60]  Jaspher W. Kathrine,et al.  Cloud Security Mechanisms for Data Protection: A Survey , 2014, MUE 2014.

[61]  Sudhansu Ranjan Lenka,et al.  Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm , 2014 .

[62]  Rini Mahajan,et al.  Cloud Computing Issues , 2005 .

[63]  Naidila Sadashiv,et al.  Cluster, grid and cloud computing: A detailed comparison , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).

[64]  Garima Gupta,et al.  A Survey on Cloud Security Issues and Techniques , 2014, RCIS 2014.

[65]  Yi Ding,et al.  Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.