Testing Data Integrity in Distributed Systems

Abstract Security threats in a distributed environment are one of the greatest threats in IT and big data on distributed infrastructure makes it more complex and difficult to implement a fool proof security framework. Network provides the access path for both inside and outside attacks which makes it the key access point for any type of security threats. Securing distributed infrastructure is not an easy task as it is complex, it requires careful configuration and it is subject to human errors. Distributed environment should be open but with proper security framework in place. Testing security threats in this kind of a complex infrastructure, with huge and unstructured data is an on-going process. Hence we need a security testing model which is capable to identify any unauthenticated intrusion immediately. This paper presents a technique to test distributed environments against attacks on data integrity.

[1]  André Schiper,et al.  Consistency in Distributed Systems (Dagstuhl Seminar 13081) , 2013, Dagstuhl Reports.

[2]  João Moreno,et al.  A testing framework for cloud storage systems , 2010 .

[3]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[4]  Godwin J. Udo,et al.  Privacy and security concerns as major barriers for e-commerce: a survey study , 2001, Inf. Manag. Comput. Secur..

[5]  William Yurcik,et al.  Toward a threat model for storage systems , 2005, StorageSS '05.

[6]  Mohamed Firdhous Implementation of Security in Distributed Systems - A Comparative Study , 2012, ArXiv.

[7]  Peter Triantafillou,et al.  Achieving Strong Consistency in a Distributed File System , 1997, IEEE Trans. Software Eng..

[8]  David Sidwell,et al.  Distributed database security , 1994, Comput. Secur..

[9]  Adam Wolisz,et al.  Consistency in Distributed Systems , 2008 .

[10]  Paul C. van Oorschot,et al.  Parallel collision search with application to hash functions and discrete logarithms , 1994, CCS '94.

[11]  Anthony Scabby,et al.  Using Hashing to Maintain Data Integrity in Cloud Computing Systems , 2010 .

[12]  Jean-Jacques Quisquater,et al.  How Easy is Collision Search? Application to DES (Extended Summary) , 1990, EUROCRYPT.

[13]  Paul C. van Oorschot,et al.  Parallel Collision Search with Cryptanalytic Applications , 2013, Journal of Cryptology.

[14]  Isao Echizen,et al.  New Approach to Quantification of Privacy on Social Network Sites , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[15]  Jean-Jacques Quisquater,et al.  How Easy is Collision Search. New Results and Applications to DES , 1989, CRYPTO.

[16]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[17]  Alexandros G. Dimakis,et al.  Security in distributed storage systems by communicating a logarithmic number of bits , 2010, 2010 IEEE International Symposium on Information Theory.