Security Optimization for Distributed Applications Oriented on Very Large Data Sets

The paper presents the main characteristics of applications which are working with very large data sets and the issues related to security. First section addresses the optimization process and how it is approached when dealing with security. The second section describes the concept of very large datasets management while in the third section the risks related are identified and classified. Finally, a security optimization schema is presented with a cost-efficiency analysis upon its feasibility. Conclusions are drawn and future approaches are identified.

[1]  Heinrich Hußmann,et al.  Look into my Eyes! Can you guess my Password? , 2009 .

[2]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[3]  Anil Kumar,et al.  Overview of Information Security Using Genetic Algorithm and Chaos , 2009, Inf. Secur. J. A Glob. Perspect..

[4]  Steven Skiena,et al.  Improving Usability Through Password-Corrective Hashing , 2006, SPIRE.

[5]  Michael Lees,et al.  Data access in distributed simulations of multi-agent systems , 2008, J. Syst. Softw..

[6]  Steven Furnell,et al.  An assessment of website password practices , 2007, Comput. Secur..

[7]  Bingsheng He,et al.  Bayesian Networks for Knowledge-Based Authentication , 2007 .

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  Joshua Cook,et al.  Improving password security and memorability to protect personal and organizational information , 2007, Int. J. Hum. Comput. Stud..

[10]  Divakaran Liginlal,et al.  A maximum entropy approach to feature selection in knowledge-based authentication , 2008, Decis. Support Syst..

[11]  Andrew Beng Jin Teoh,et al.  A secure digital camera based fingerprint verification system , 2010, J. Vis. Commun. Image Represent..

[12]  Ion Ivan,et al.  Stable Structures for Distributed Applications , 2008 .

[13]  Dov Dori,et al.  A Software System Development Life Cycle Model for Improved Stakeholders' Communication and Collaboration , 2010, Int. J. Comput. Commun. Control.

[14]  Curtis E. Dyreson,et al.  Building test cases and oracles to automate the testing of web database applications , 2009, Inf. Softw. Technol..

[15]  Zhi-Qiang Liu,et al.  Region-Level Image Authentication Using Bayesian Structural Content Abstraction , 2008, IEEE Transactions on Image Processing.

[16]  Jeff Yan,et al.  Is FacePIN secure and usable? , 2007, SOUPS '07.

[17]  P. Ostojic,et al.  Memorability of Alternative Password Systems , 2009, Int. J. Pattern Recognit. Artif. Intell..