SlideShare a Scribd company logo
1 of 4
Download to read offline
http://www.iaeme.com/IJCIET/index.asp 13 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 6, Issue 10, Oct 2015, pp. 13-16, Article ID: IJCET_06_10_002
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
A REVIEW ON DATA SECURITY IN
DISTRIBUTED SYSTEM
P. Deepa Lakshmi and J. S. Praveen
Research Scholar, Information Technology,
AMET University
V. Venkatraman
Research Scholar,
AMET University
Dr. N. Manoharan
Director-Research,
AMET University
ABSTRACT
This research manages information security administration in appropriated
and customer/server PC frameworks, putting uncommon accentuation on access
security. The paper shows the subject of information security administration in
these frameworks by depicting them, inspecting their defenseless focuses and
introducing sufficient arrangements. The paper incorporates a study on the
subject of approval, validation, encryption and access control – the principle
parts in information security administration of conveyed frameworks.
Notwithstanding a review and investigation of information security
administration angles, an arrangement of an entrance security framework in
light of customer/server structural planning is displayed, which may be
consolidated with applications requiring access security administrations. The
model portrays the entrance security server and the interface for access security
which is consolidated with the application and constitutes the customer bit.
Key words: Distributed systems, client/server.
Cite this Article: Deepa Lakshmi, P., Praveen, J. S., Venkatraman, V. and Dr.
Manoharan, N. A Review on Data Security in Distributed System. International
Journal of Computer Engineering and Technology, 6(10), 2015, pp. 13-16.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10
1. INTRODUCTION
Each association ought to be worried about securing information against interlopers,
for the association’s capacity to survive relies on upon the accessibility, completeness
P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan
http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com
and dependability of its monetary and hierarchical information. Security has turned
out to be more entangled with the extended utilize and systems administration of PCs.
At present, the neighborhood systems and the associations between the extensive and
little PCs are such that each of them tunes in the application. The application overall
gives off an impression of being situated on the client’s PC, yet indeed every client
and every application has entry to, and now and then even control over, hierarchical
information on different PCs and storerooms. Clearly, such openness welcomes
unapproved utilize, and requires information security coordination and administration
(Appelton, 1997). Tragically, numerous organizations don’t manage information
security and system administration issues until there is a break in the system. To
ensure indispensable data, the organizations must set up a sound security framework
before the system is barged in. This includes distinguishing proof of the security
dangers, applying adequate method for security, and showing the clients information
security mindfulness.
2. DISTRIBUTED SYSTEMS
The most imperative piece of conveyed frameworks is its joint information system
which is the operational hub of the association and has a tendency to develop with the
association’s advancement furthermore, the advancement of innovation. Now and
again the system will join various autonomous associations with administration and
different servers to shape the circulated framework. For instance, it is conceivable to
portray an authoritative system in an extensive association with countless and
divisions (Bellovin, 1997).
3. CLIENT/SERVER SYSTEMS
Conventional disseminated frameworks empower clients to utilize information and
applications on removed systems without limiting them to systems that they are
specifically associated with. In customer/server frameworks the customary usefulness
of the centralized computer is separated into two: A client interface and a core of one
or more applications enacted at the fringe station characterized as a “customer”.
Management of the database and piece of the application enacted on another
framework defineda a “server”. Through this division every segment in the system
may do the work for which it is generally suited. The two sections of the application
are associated by means of unique programming empowering exchange of messages
between the customer and the server. Customer/server applications are extremely
adaptable and permit clients to get to databases on different systems all by means of a
realistic interface, which does not exist on centralized computer frameworks
(Neuman, 1998).
4. DATA SECURITY MANAGEMENT – GENERAL PROBLEMS
Sadly, advancement of information security in appropriated frameworks happens at
the same time with the system’s improvement, as depicted previously. Advancement
in stages may bring about an increment of the touchy focuses in the system security,
as depicted hereunder (Sanders, 2000). In some non programmed security subsystems,
manual login systems power clients to sort their client name and secret key. Not just
does this make the framework wasteful, it even uncovered the information security
system, for the clients frequently record their secret word on paper beside their
working station, for anyone passing by to view (White, 1999). Moreover, most clients
A Review on Data Security in Distributed System
http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com
don’t make a propensity for changing their passwords now and again and keep
utilizing the same secret key again and again.
5. DEVELOPMENT OF AN ACCESS SECURITY SYSTEM
MODEL
In this an exploration’s piece we will display a model for an entrance security
framework working in a neighborhood situation (LAN) with numerous stations and
clients. The model is for applications going for consolidating access security
components in an applications’ piece which will render client sectionalizing
administrations, supply passwords and approval to clients and stations of the system.
The model is for the most part suitable for frameworks in which the administrators
utilize an extensive number of inquiries and exchanges
overhauling/cancelation/expansion which must be sectionalized and arrange clients
access. As a case we may utilize the information framework at a bank office. The
framework incorporates an extensive number of inquiries and bank exchanges
actuated by representatives at the branch as per the different divisions.
Sectionalization of the exchanges and clients at the branch may be as per the chain of
importance at the branch: administrator, representative director, office chiefs, agents -
or as indicated by the offices’ way: outside coin, securities, current records and so on.
An agent at the present records division will have the capacity to complete current
record exchanges just, while different exchanges are hindered to him. The model we
exhibit here offers the full answer for these sorts of frameworks.
Figure 1 The Distributed Security Approach
6. ARCHITECTURE OF THE ACCESS SECURITY SOFTWARE
The entrance security server is made from a number out of layers and levels managing
the different parts of the product.
 The correspondence layer: Deals with correspondence opposite the customers, getting
messages and sending answers.
 The discussion layer: Deals with recognizable proof and investigation of the
messages got from customers, groups the messages and isolates them into the
different parameters. This layer likewise builds the customer’s answer transmission.
 The application layer: Operates on three principle levels: taking care of solicitations
for administrations with respect to the client (definition, examination, cancellation),
P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan
http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com
taking care of demands for administrations with respect to the station and taking care
of solicitations for exchange administrations.
The administrations rendered consent to the solicitations the customer may do,
which were depicted in the discussion layer on the customer’s side. The application
layer is helped by an extra sub-layer of documents administrations which supply
every one of the exchanges required for doing on the framework’s records, for
example, pursuit, overhaul, scratch off, commercial, close and so on.
Figure 2 Software architecture based on the Client/Server
7. CONCLUSION
The worries numerous associations have for shielding their information and
applications from interlopers in an extensive number of clients environment, can be
disposed of or possibly constricted. Another and imaginative approach to do as such is
through the usage of an entrance security model. The model created in this
exploration is a novel access security model with a customer/server application. To
date, the different models for information access security in a circulated framework
have not gave a powerful and far reaching arrangement managing every one of the
perspectives and levels of the modernized frameworks acting in the customer/server
environment.
REFERENCES
[1] Amoroso, E. Fundamentals of Computer Security Technology, ch. 7, Englewood
Cliffs, NJ: Prentice-Hall, 1994.
[2] Appelton, K. and Elain, L. Network Security: Is Your LANsafe? DATAMATION,
39, 1997, pp. 45-49.
[3] Bellovin, S. and Cheswick, W. (1997), Network Firewalls, IEEE
Communications Magazine, September 1997, pp. 65-70.
[4] Burleson, D. Managing security in a distributed database environment, DBMS, 8,
1998, pp. 72-77.
[5] Clifford, R., Neuman, B. and Theodore Ts’o (1998), Kerberos: An Authentication
Service For Computer Networks, IEEE Communications Magazine, September
1998.
[6] Elliot, P., Pretty Good Privacy (PGP), Electronic Frontiers Houston, Internet
(http://www.efh.org)

More Related Content

Similar to A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEM

Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Modeltom termini
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and SecurityShashank Srivastava
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...IJECEIAES
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 

Similar to A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEM (18)

J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Download
DownloadDownload
Download
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 

More from Sara Alvarez

Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing Services
Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing ServicesBuy-Custom-Essays-Online.Com Review Revieweal - Top Writing Services
Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing ServicesSara Alvarez
 
Research Paper Executive Summary Q. How Do I Wr
Research Paper Executive Summary Q. How Do I WrResearch Paper Executive Summary Q. How Do I Wr
Research Paper Executive Summary Q. How Do I WrSara Alvarez
 
How To Format An Abstract For A Resea
How To Format An Abstract For A ReseaHow To Format An Abstract For A Resea
How To Format An Abstract For A ReseaSara Alvarez
 
College Admissions Ess
College Admissions EssCollege Admissions Ess
College Admissions EssSara Alvarez
 
Hotelsafessave How To Write A Reflection Paper U
Hotelsafessave How To Write A Reflection Paper UHotelsafessave How To Write A Reflection Paper U
Hotelsafessave How To Write A Reflection Paper USara Alvarez
 
Step-By-Step Guide To Successful HSC Essay Writi
Step-By-Step Guide To Successful HSC Essay WritiStep-By-Step Guide To Successful HSC Essay Writi
Step-By-Step Guide To Successful HSC Essay WritiSara Alvarez
 
Free Winter Writing Template - Free4Classrooms Wint
Free Winter Writing Template - Free4Classrooms WintFree Winter Writing Template - Free4Classrooms Wint
Free Winter Writing Template - Free4Classrooms WintSara Alvarez
 
SuperEasy Ways To Learn Everything About College Essay Titles
SuperEasy Ways To Learn Everything About College Essay TitlesSuperEasy Ways To Learn Everything About College Essay Titles
SuperEasy Ways To Learn Everything About College Essay TitlesSara Alvarez
 
Instagram Photo By EAge Spoken Englis
Instagram Photo By EAge Spoken EnglisInstagram Photo By EAge Spoken Englis
Instagram Photo By EAge Spoken EnglisSara Alvarez
 
Write My Research Paper - Good Topics For A Science E
Write My Research Paper - Good Topics For A Science EWrite My Research Paper - Good Topics For A Science E
Write My Research Paper - Good Topics For A Science ESara Alvarez
 
Writing Your Self Assessment --- By Holymoleyjobs -Uk J
Writing Your Self Assessment --- By Holymoleyjobs -Uk JWriting Your Self Assessment --- By Holymoleyjobs -Uk J
Writing Your Self Assessment --- By Holymoleyjobs -Uk JSara Alvarez
 
Poetry Writing In The Primary Grades First Grade Buddies
Poetry Writing In The Primary Grades First Grade BuddiesPoetry Writing In The Primary Grades First Grade Buddies
Poetry Writing In The Primary Grades First Grade BuddiesSara Alvarez
 
Essay On How To Analyze A Movi
Essay On How To Analyze A MoviEssay On How To Analyze A Movi
Essay On How To Analyze A MoviSara Alvarez
 
Starting An Essay With A Quote - The Most Effectiv
Starting An Essay With A Quote - The Most EffectivStarting An Essay With A Quote - The Most Effectiv
Starting An Essay With A Quote - The Most EffectivSara Alvarez
 
Compare And Contrast Worksheets 4Th Grade
Compare And Contrast Worksheets 4Th GradeCompare And Contrast Worksheets 4Th Grade
Compare And Contrast Worksheets 4Th GradeSara Alvarez
 
How To Write A Winning Scholarship Essay 17 Be
How To Write A Winning Scholarship Essay 17 BeHow To Write A Winning Scholarship Essay 17 Be
How To Write A Winning Scholarship Essay 17 BeSara Alvarez
 
Reflection Paper Self-Assessment Of Learnin
Reflection Paper Self-Assessment Of LearninReflection Paper Self-Assessment Of Learnin
Reflection Paper Self-Assessment Of LearninSara Alvarez
 
PPT - What Is A Hook Sentence PowerPoint Pre
PPT - What Is A Hook Sentence PowerPoint PrePPT - What Is A Hook Sentence PowerPoint Pre
PPT - What Is A Hook Sentence PowerPoint PreSara Alvarez
 
Quotes About Being Single Essay Wallpaper Image P
Quotes About Being Single Essay Wallpaper Image PQuotes About Being Single Essay Wallpaper Image P
Quotes About Being Single Essay Wallpaper Image PSara Alvarez
 
Printable Handwriting Paper Madison S Paper Template
Printable Handwriting Paper Madison S Paper TemplatePrintable Handwriting Paper Madison S Paper Template
Printable Handwriting Paper Madison S Paper TemplateSara Alvarez
 

More from Sara Alvarez (20)

Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing Services
Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing ServicesBuy-Custom-Essays-Online.Com Review Revieweal - Top Writing Services
Buy-Custom-Essays-Online.Com Review Revieweal - Top Writing Services
 
Research Paper Executive Summary Q. How Do I Wr
Research Paper Executive Summary Q. How Do I WrResearch Paper Executive Summary Q. How Do I Wr
Research Paper Executive Summary Q. How Do I Wr
 
How To Format An Abstract For A Resea
How To Format An Abstract For A ReseaHow To Format An Abstract For A Resea
How To Format An Abstract For A Resea
 
College Admissions Ess
College Admissions EssCollege Admissions Ess
College Admissions Ess
 
Hotelsafessave How To Write A Reflection Paper U
Hotelsafessave How To Write A Reflection Paper UHotelsafessave How To Write A Reflection Paper U
Hotelsafessave How To Write A Reflection Paper U
 
Step-By-Step Guide To Successful HSC Essay Writi
Step-By-Step Guide To Successful HSC Essay WritiStep-By-Step Guide To Successful HSC Essay Writi
Step-By-Step Guide To Successful HSC Essay Writi
 
Free Winter Writing Template - Free4Classrooms Wint
Free Winter Writing Template - Free4Classrooms WintFree Winter Writing Template - Free4Classrooms Wint
Free Winter Writing Template - Free4Classrooms Wint
 
SuperEasy Ways To Learn Everything About College Essay Titles
SuperEasy Ways To Learn Everything About College Essay TitlesSuperEasy Ways To Learn Everything About College Essay Titles
SuperEasy Ways To Learn Everything About College Essay Titles
 
Instagram Photo By EAge Spoken Englis
Instagram Photo By EAge Spoken EnglisInstagram Photo By EAge Spoken Englis
Instagram Photo By EAge Spoken Englis
 
Write My Research Paper - Good Topics For A Science E
Write My Research Paper - Good Topics For A Science EWrite My Research Paper - Good Topics For A Science E
Write My Research Paper - Good Topics For A Science E
 
Writing Your Self Assessment --- By Holymoleyjobs -Uk J
Writing Your Self Assessment --- By Holymoleyjobs -Uk JWriting Your Self Assessment --- By Holymoleyjobs -Uk J
Writing Your Self Assessment --- By Holymoleyjobs -Uk J
 
Poetry Writing In The Primary Grades First Grade Buddies
Poetry Writing In The Primary Grades First Grade BuddiesPoetry Writing In The Primary Grades First Grade Buddies
Poetry Writing In The Primary Grades First Grade Buddies
 
Essay On How To Analyze A Movi
Essay On How To Analyze A MoviEssay On How To Analyze A Movi
Essay On How To Analyze A Movi
 
Starting An Essay With A Quote - The Most Effectiv
Starting An Essay With A Quote - The Most EffectivStarting An Essay With A Quote - The Most Effectiv
Starting An Essay With A Quote - The Most Effectiv
 
Compare And Contrast Worksheets 4Th Grade
Compare And Contrast Worksheets 4Th GradeCompare And Contrast Worksheets 4Th Grade
Compare And Contrast Worksheets 4Th Grade
 
How To Write A Winning Scholarship Essay 17 Be
How To Write A Winning Scholarship Essay 17 BeHow To Write A Winning Scholarship Essay 17 Be
How To Write A Winning Scholarship Essay 17 Be
 
Reflection Paper Self-Assessment Of Learnin
Reflection Paper Self-Assessment Of LearninReflection Paper Self-Assessment Of Learnin
Reflection Paper Self-Assessment Of Learnin
 
PPT - What Is A Hook Sentence PowerPoint Pre
PPT - What Is A Hook Sentence PowerPoint PrePPT - What Is A Hook Sentence PowerPoint Pre
PPT - What Is A Hook Sentence PowerPoint Pre
 
Quotes About Being Single Essay Wallpaper Image P
Quotes About Being Single Essay Wallpaper Image PQuotes About Being Single Essay Wallpaper Image P
Quotes About Being Single Essay Wallpaper Image P
 
Printable Handwriting Paper Madison S Paper Template
Printable Handwriting Paper Madison S Paper TemplatePrintable Handwriting Paper Madison S Paper Template
Printable Handwriting Paper Madison S Paper Template
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEM

  • 1. http://www.iaeme.com/IJCIET/index.asp 13 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 10, Oct 2015, pp. 13-16, Article ID: IJCET_06_10_002 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEM P. Deepa Lakshmi and J. S. Praveen Research Scholar, Information Technology, AMET University V. Venkatraman Research Scholar, AMET University Dr. N. Manoharan Director-Research, AMET University ABSTRACT This research manages information security administration in appropriated and customer/server PC frameworks, putting uncommon accentuation on access security. The paper shows the subject of information security administration in these frameworks by depicting them, inspecting their defenseless focuses and introducing sufficient arrangements. The paper incorporates a study on the subject of approval, validation, encryption and access control – the principle parts in information security administration of conveyed frameworks. Notwithstanding a review and investigation of information security administration angles, an arrangement of an entrance security framework in light of customer/server structural planning is displayed, which may be consolidated with applications requiring access security administrations. The model portrays the entrance security server and the interface for access security which is consolidated with the application and constitutes the customer bit. Key words: Distributed systems, client/server. Cite this Article: Deepa Lakshmi, P., Praveen, J. S., Venkatraman, V. and Dr. Manoharan, N. A Review on Data Security in Distributed System. International Journal of Computer Engineering and Technology, 6(10), 2015, pp. 13-16. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 1. INTRODUCTION Each association ought to be worried about securing information against interlopers, for the association’s capacity to survive relies on upon the accessibility, completeness
  • 2. P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com and dependability of its monetary and hierarchical information. Security has turned out to be more entangled with the extended utilize and systems administration of PCs. At present, the neighborhood systems and the associations between the extensive and little PCs are such that each of them tunes in the application. The application overall gives off an impression of being situated on the client’s PC, yet indeed every client and every application has entry to, and now and then even control over, hierarchical information on different PCs and storerooms. Clearly, such openness welcomes unapproved utilize, and requires information security coordination and administration (Appelton, 1997). Tragically, numerous organizations don’t manage information security and system administration issues until there is a break in the system. To ensure indispensable data, the organizations must set up a sound security framework before the system is barged in. This includes distinguishing proof of the security dangers, applying adequate method for security, and showing the clients information security mindfulness. 2. DISTRIBUTED SYSTEMS The most imperative piece of conveyed frameworks is its joint information system which is the operational hub of the association and has a tendency to develop with the association’s advancement furthermore, the advancement of innovation. Now and again the system will join various autonomous associations with administration and different servers to shape the circulated framework. For instance, it is conceivable to portray an authoritative system in an extensive association with countless and divisions (Bellovin, 1997). 3. CLIENT/SERVER SYSTEMS Conventional disseminated frameworks empower clients to utilize information and applications on removed systems without limiting them to systems that they are specifically associated with. In customer/server frameworks the customary usefulness of the centralized computer is separated into two: A client interface and a core of one or more applications enacted at the fringe station characterized as a “customer”. Management of the database and piece of the application enacted on another framework defineda a “server”. Through this division every segment in the system may do the work for which it is generally suited. The two sections of the application are associated by means of unique programming empowering exchange of messages between the customer and the server. Customer/server applications are extremely adaptable and permit clients to get to databases on different systems all by means of a realistic interface, which does not exist on centralized computer frameworks (Neuman, 1998). 4. DATA SECURITY MANAGEMENT – GENERAL PROBLEMS Sadly, advancement of information security in appropriated frameworks happens at the same time with the system’s improvement, as depicted previously. Advancement in stages may bring about an increment of the touchy focuses in the system security, as depicted hereunder (Sanders, 2000). In some non programmed security subsystems, manual login systems power clients to sort their client name and secret key. Not just does this make the framework wasteful, it even uncovered the information security system, for the clients frequently record their secret word on paper beside their working station, for anyone passing by to view (White, 1999). Moreover, most clients
  • 3. A Review on Data Security in Distributed System http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com don’t make a propensity for changing their passwords now and again and keep utilizing the same secret key again and again. 5. DEVELOPMENT OF AN ACCESS SECURITY SYSTEM MODEL In this an exploration’s piece we will display a model for an entrance security framework working in a neighborhood situation (LAN) with numerous stations and clients. The model is for applications going for consolidating access security components in an applications’ piece which will render client sectionalizing administrations, supply passwords and approval to clients and stations of the system. The model is for the most part suitable for frameworks in which the administrators utilize an extensive number of inquiries and exchanges overhauling/cancelation/expansion which must be sectionalized and arrange clients access. As a case we may utilize the information framework at a bank office. The framework incorporates an extensive number of inquiries and bank exchanges actuated by representatives at the branch as per the different divisions. Sectionalization of the exchanges and clients at the branch may be as per the chain of importance at the branch: administrator, representative director, office chiefs, agents - or as indicated by the offices’ way: outside coin, securities, current records and so on. An agent at the present records division will have the capacity to complete current record exchanges just, while different exchanges are hindered to him. The model we exhibit here offers the full answer for these sorts of frameworks. Figure 1 The Distributed Security Approach 6. ARCHITECTURE OF THE ACCESS SECURITY SOFTWARE The entrance security server is made from a number out of layers and levels managing the different parts of the product.  The correspondence layer: Deals with correspondence opposite the customers, getting messages and sending answers.  The discussion layer: Deals with recognizable proof and investigation of the messages got from customers, groups the messages and isolates them into the different parameters. This layer likewise builds the customer’s answer transmission.  The application layer: Operates on three principle levels: taking care of solicitations for administrations with respect to the client (definition, examination, cancellation),
  • 4. P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com taking care of demands for administrations with respect to the station and taking care of solicitations for exchange administrations. The administrations rendered consent to the solicitations the customer may do, which were depicted in the discussion layer on the customer’s side. The application layer is helped by an extra sub-layer of documents administrations which supply every one of the exchanges required for doing on the framework’s records, for example, pursuit, overhaul, scratch off, commercial, close and so on. Figure 2 Software architecture based on the Client/Server 7. CONCLUSION The worries numerous associations have for shielding their information and applications from interlopers in an extensive number of clients environment, can be disposed of or possibly constricted. Another and imaginative approach to do as such is through the usage of an entrance security model. The model created in this exploration is a novel access security model with a customer/server application. To date, the different models for information access security in a circulated framework have not gave a powerful and far reaching arrangement managing every one of the perspectives and levels of the modernized frameworks acting in the customer/server environment. REFERENCES [1] Amoroso, E. Fundamentals of Computer Security Technology, ch. 7, Englewood Cliffs, NJ: Prentice-Hall, 1994. [2] Appelton, K. and Elain, L. Network Security: Is Your LANsafe? DATAMATION, 39, 1997, pp. 45-49. [3] Bellovin, S. and Cheswick, W. (1997), Network Firewalls, IEEE Communications Magazine, September 1997, pp. 65-70. [4] Burleson, D. Managing security in a distributed database environment, DBMS, 8, 1998, pp. 72-77. [5] Clifford, R., Neuman, B. and Theodore Ts’o (1998), Kerberos: An Authentication Service For Computer Networks, IEEE Communications Magazine, September 1998. [6] Elliot, P., Pretty Good Privacy (PGP), Electronic Frontiers Houston, Internet (http://www.efh.org)