SlideShare a Scribd company logo
http://www.iaeme.com/IJCIET/index.asp 13 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 6, Issue 10, Oct 2015, pp. 13-16, Article ID: IJCET_06_10_002
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
A REVIEW ON DATA SECURITY IN
DISTRIBUTED SYSTEM
P. Deepa Lakshmi and J. S. Praveen
Research Scholar, Information Technology,
AMET University
V. Venkatraman
Research Scholar,
AMET University
Dr. N. Manoharan
Director-Research,
AMET University
ABSTRACT
This research manages information security administration in appropriated
and customer/server PC frameworks, putting uncommon accentuation on access
security. The paper shows the subject of information security administration in
these frameworks by depicting them, inspecting their defenseless focuses and
introducing sufficient arrangements. The paper incorporates a study on the
subject of approval, validation, encryption and access control – the principle
parts in information security administration of conveyed frameworks.
Notwithstanding a review and investigation of information security
administration angles, an arrangement of an entrance security framework in
light of customer/server structural planning is displayed, which may be
consolidated with applications requiring access security administrations. The
model portrays the entrance security server and the interface for access security
which is consolidated with the application and constitutes the customer bit.
Key words: Distributed systems, client/server.
Cite this Article: Deepa Lakshmi, P., Praveen, J. S., Venkatraman, V. and Dr.
Manoharan, N. A Review on Data Security in Distributed System. International
Journal of Computer Engineering and Technology, 6(10), 2015, pp. 13-16.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10
1. INTRODUCTION
Each association ought to be worried about securing information against interlopers,
for the association’s capacity to survive relies on upon the accessibility, completeness
P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan
http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com
and dependability of its monetary and hierarchical information. Security has turned
out to be more entangled with the extended utilize and systems administration of PCs.
At present, the neighborhood systems and the associations between the extensive and
little PCs are such that each of them tunes in the application. The application overall
gives off an impression of being situated on the client’s PC, yet indeed every client
and every application has entry to, and now and then even control over, hierarchical
information on different PCs and storerooms. Clearly, such openness welcomes
unapproved utilize, and requires information security coordination and administration
(Appelton, 1997). Tragically, numerous organizations don’t manage information
security and system administration issues until there is a break in the system. To
ensure indispensable data, the organizations must set up a sound security framework
before the system is barged in. This includes distinguishing proof of the security
dangers, applying adequate method for security, and showing the clients information
security mindfulness.
2. DISTRIBUTED SYSTEMS
The most imperative piece of conveyed frameworks is its joint information system
which is the operational hub of the association and has a tendency to develop with the
association’s advancement furthermore, the advancement of innovation. Now and
again the system will join various autonomous associations with administration and
different servers to shape the circulated framework. For instance, it is conceivable to
portray an authoritative system in an extensive association with countless and
divisions (Bellovin, 1997).
3. CLIENT/SERVER SYSTEMS
Conventional disseminated frameworks empower clients to utilize information and
applications on removed systems without limiting them to systems that they are
specifically associated with. In customer/server frameworks the customary usefulness
of the centralized computer is separated into two: A client interface and a core of one
or more applications enacted at the fringe station characterized as a “customer”.
Management of the database and piece of the application enacted on another
framework defineda a “server”. Through this division every segment in the system
may do the work for which it is generally suited. The two sections of the application
are associated by means of unique programming empowering exchange of messages
between the customer and the server. Customer/server applications are extremely
adaptable and permit clients to get to databases on different systems all by means of a
realistic interface, which does not exist on centralized computer frameworks
(Neuman, 1998).
4. DATA SECURITY MANAGEMENT – GENERAL PROBLEMS
Sadly, advancement of information security in appropriated frameworks happens at
the same time with the system’s improvement, as depicted previously. Advancement
in stages may bring about an increment of the touchy focuses in the system security,
as depicted hereunder (Sanders, 2000). In some non programmed security subsystems,
manual login systems power clients to sort their client name and secret key. Not just
does this make the framework wasteful, it even uncovered the information security
system, for the clients frequently record their secret word on paper beside their
working station, for anyone passing by to view (White, 1999). Moreover, most clients
A Review on Data Security in Distributed System
http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com
don’t make a propensity for changing their passwords now and again and keep
utilizing the same secret key again and again.
5. DEVELOPMENT OF AN ACCESS SECURITY SYSTEM
MODEL
In this an exploration’s piece we will display a model for an entrance security
framework working in a neighborhood situation (LAN) with numerous stations and
clients. The model is for applications going for consolidating access security
components in an applications’ piece which will render client sectionalizing
administrations, supply passwords and approval to clients and stations of the system.
The model is for the most part suitable for frameworks in which the administrators
utilize an extensive number of inquiries and exchanges
overhauling/cancelation/expansion which must be sectionalized and arrange clients
access. As a case we may utilize the information framework at a bank office. The
framework incorporates an extensive number of inquiries and bank exchanges
actuated by representatives at the branch as per the different divisions.
Sectionalization of the exchanges and clients at the branch may be as per the chain of
importance at the branch: administrator, representative director, office chiefs, agents -
or as indicated by the offices’ way: outside coin, securities, current records and so on.
An agent at the present records division will have the capacity to complete current
record exchanges just, while different exchanges are hindered to him. The model we
exhibit here offers the full answer for these sorts of frameworks.
Figure 1 The Distributed Security Approach
6. ARCHITECTURE OF THE ACCESS SECURITY SOFTWARE
The entrance security server is made from a number out of layers and levels managing
the different parts of the product.
 The correspondence layer: Deals with correspondence opposite the customers, getting
messages and sending answers.
 The discussion layer: Deals with recognizable proof and investigation of the
messages got from customers, groups the messages and isolates them into the
different parameters. This layer likewise builds the customer’s answer transmission.
 The application layer: Operates on three principle levels: taking care of solicitations
for administrations with respect to the client (definition, examination, cancellation),
P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan
http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com
taking care of demands for administrations with respect to the station and taking care
of solicitations for exchange administrations.
The administrations rendered consent to the solicitations the customer may do,
which were depicted in the discussion layer on the customer’s side. The application
layer is helped by an extra sub-layer of documents administrations which supply
every one of the exchanges required for doing on the framework’s records, for
example, pursuit, overhaul, scratch off, commercial, close and so on.
Figure 2 Software architecture based on the Client/Server
7. CONCLUSION
The worries numerous associations have for shielding their information and
applications from interlopers in an extensive number of clients environment, can be
disposed of or possibly constricted. Another and imaginative approach to do as such is
through the usage of an entrance security model. The model created in this
exploration is a novel access security model with a customer/server application. To
date, the different models for information access security in a circulated framework
have not gave a powerful and far reaching arrangement managing every one of the
perspectives and levels of the modernized frameworks acting in the customer/server
environment.
REFERENCES
[1] Amoroso, E. Fundamentals of Computer Security Technology, ch. 7, Englewood
Cliffs, NJ: Prentice-Hall, 1994.
[2] Appelton, K. and Elain, L. Network Security: Is Your LANsafe? DATAMATION,
39, 1997, pp. 45-49.
[3] Bellovin, S. and Cheswick, W. (1997), Network Firewalls, IEEE
Communications Magazine, September 1997, pp. 65-70.
[4] Burleson, D. Managing security in a distributed database environment, DBMS, 8,
1998, pp. 72-77.
[5] Clifford, R., Neuman, B. and Theodore Ts’o (1998), Kerberos: An Authentication
Service For Computer Networks, IEEE Communications Magazine, September
1998.
[6] Elliot, P., Pretty Good Privacy (PGP), Electronic Frontiers Houston, Internet
(http://www.efh.org)

More Related Content

What's hot

Vertualisation
VertualisationVertualisation
Vertualisation
Chkifa Khalid
 
L5 Dependability Requirements
L5 Dependability RequirementsL5 Dependability Requirements
L5 Dependability Requirements
Ian Sommerville
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
ijccsa
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
eSAT Publishing House
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
eSAT Journals
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
IJRES Journal
 
Application security models
Application security modelsApplication security models
Application security models
ERSHUBHAM TIWARI
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automation
johnnywess
 
N018138696
N018138696N018138696
N018138696
IOSR Journals
 
Access control policy
Access control policyAccess control policy
Access control policy
Bsmah Fahad
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
Matthew J McMahon
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
n allali
 
Electronic document management strategies and techniques final
Electronic document management strategies and techniques finalElectronic document management strategies and techniques final
Electronic document management strategies and techniques final
Manas Ganguli
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
PaaSword EU Project
 
81-T48
81-T4881-T48
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
EMC
 
IBM System i Security Study 2013
IBM System i Security Study 2013IBM System i Security Study 2013
IBM System i Security Study 2013
Keith Braswell
 

What's hot (17)

Vertualisation
VertualisationVertualisation
Vertualisation
 
L5 Dependability Requirements
L5 Dependability RequirementsL5 Dependability Requirements
L5 Dependability Requirements
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
 
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloudA study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in cloud
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
Application security models
Application security modelsApplication security models
Application security models
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automation
 
N018138696
N018138696N018138696
N018138696
 
Access control policy
Access control policyAccess control policy
Access control policy
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
 
Electronic document management strategies and techniques final
Electronic document management strategies and techniques finalElectronic document management strategies and techniques final
Electronic document management strategies and techniques final
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
81-T48
81-T4881-T48
81-T48
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
IBM System i Security Study 2013
IBM System i Security Study 2013IBM System i Security Study 2013
IBM System i Security Study 2013
 

Viewers also liked

Storyboard
StoryboardStoryboard
Storyboard
ak161702
 
Ijciet 06 09_018
Ijciet 06 09_018Ijciet 06 09_018
Ijciet 06 09_018
IAEME Publication
 
игрушки из природного материала
игрушки из природного материалаигрушки из природного материала
игрушки из природного материала
aviamed
 
Guidelines for minimum use of MyUni
Guidelines for minimum use of MyUniGuidelines for minimum use of MyUni
Guidelines for minimum use of MyUni
Blackboard APAC
 
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
Blackboard APAC
 
VC Pitch UGBA 100
VC Pitch UGBA 100VC Pitch UGBA 100
VC Pitch UGBA 100
Jerry Sun
 
What Is A Smart City
What Is A Smart CityWhat Is A Smart City
What Is A Smart City
Tiscon Readybuild
 
Quantitative research feedback and analysis
Quantitative research feedback and analysisQuantitative research feedback and analysis
Quantitative research feedback and analysis
Chloe_ann07
 
Setting up Performance Testing & Engineering COE - Top 10 success secrets
Setting up Performance Testing & Engineering COE - Top 10 success secretsSetting up Performance Testing & Engineering COE - Top 10 success secrets
Setting up Performance Testing & Engineering COE - Top 10 success secrets
Ramya Ramalinga Moorthy
 
JAK Resume
JAK ResumeJAK Resume
JAK Resume
John Knox
 
Ieee 2016 Image Processing Papers Trichy
Ieee 2016 Image Processing  Papers TrichyIeee 2016 Image Processing  Papers Trichy
Ieee 2016 Image Processing Papers Trichy
krish madhi
 
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
Blackboard APAC
 
Judiciary
JudiciaryJudiciary
Endodontic surgery
Endodontic surgeryEndodontic surgery
Endodontic surgery
Parth Thakkar
 
Tugas algoritma arif
Tugas algoritma arifTugas algoritma arif
Tugas algoritma arif
Arif Setiawan
 
Endodontic surgery
Endodontic surgeryEndodontic surgery
Endodontic surgery
Abhijeet Khade
 

Viewers also liked (16)

Storyboard
StoryboardStoryboard
Storyboard
 
Ijciet 06 09_018
Ijciet 06 09_018Ijciet 06 09_018
Ijciet 06 09_018
 
игрушки из природного материала
игрушки из природного материалаигрушки из природного материала
игрушки из природного материала
 
Guidelines for minimum use of MyUni
Guidelines for minimum use of MyUniGuidelines for minimum use of MyUni
Guidelines for minimum use of MyUni
 
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
Adoption of Blackboard in the ELICOS system: Innovating and Augmenting Qualit...
 
VC Pitch UGBA 100
VC Pitch UGBA 100VC Pitch UGBA 100
VC Pitch UGBA 100
 
What Is A Smart City
What Is A Smart CityWhat Is A Smart City
What Is A Smart City
 
Quantitative research feedback and analysis
Quantitative research feedback and analysisQuantitative research feedback and analysis
Quantitative research feedback and analysis
 
Setting up Performance Testing & Engineering COE - Top 10 success secrets
Setting up Performance Testing & Engineering COE - Top 10 success secretsSetting up Performance Testing & Engineering COE - Top 10 success secrets
Setting up Performance Testing & Engineering COE - Top 10 success secrets
 
JAK Resume
JAK ResumeJAK Resume
JAK Resume
 
Ieee 2016 Image Processing Papers Trichy
Ieee 2016 Image Processing  Papers TrichyIeee 2016 Image Processing  Papers Trichy
Ieee 2016 Image Processing Papers Trichy
 
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
Online assessment and data analytics - Peter Tan - Institute of Technical Edu...
 
Judiciary
JudiciaryJudiciary
Judiciary
 
Endodontic surgery
Endodontic surgeryEndodontic surgery
Endodontic surgery
 
Tugas algoritma arif
Tugas algoritma arifTugas algoritma arif
Tugas algoritma arif
 
Endodontic surgery
Endodontic surgeryEndodontic surgery
Endodontic surgery
 

Similar to Ijcet 06 10_002

Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
Pamela Wright
 
A017130104
A017130104A017130104
A017130104
IOSR Journals
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
ijcnes
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
Ronald Jackson, Jr
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
J017325660
J017325660J017325660
J017325660
IOSR Journals
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
Download
DownloadDownload
Download
Valar Mathi
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
jwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
tom termini
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
Shashank Srivastava
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 

Similar to Ijcet 06 10_002 (20)

Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Download
DownloadDownload
Download
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

Ijcet 06 10_002

  • 1. http://www.iaeme.com/IJCIET/index.asp 13 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 10, Oct 2015, pp. 13-16, Article ID: IJCET_06_10_002 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEM P. Deepa Lakshmi and J. S. Praveen Research Scholar, Information Technology, AMET University V. Venkatraman Research Scholar, AMET University Dr. N. Manoharan Director-Research, AMET University ABSTRACT This research manages information security administration in appropriated and customer/server PC frameworks, putting uncommon accentuation on access security. The paper shows the subject of information security administration in these frameworks by depicting them, inspecting their defenseless focuses and introducing sufficient arrangements. The paper incorporates a study on the subject of approval, validation, encryption and access control – the principle parts in information security administration of conveyed frameworks. Notwithstanding a review and investigation of information security administration angles, an arrangement of an entrance security framework in light of customer/server structural planning is displayed, which may be consolidated with applications requiring access security administrations. The model portrays the entrance security server and the interface for access security which is consolidated with the application and constitutes the customer bit. Key words: Distributed systems, client/server. Cite this Article: Deepa Lakshmi, P., Praveen, J. S., Venkatraman, V. and Dr. Manoharan, N. A Review on Data Security in Distributed System. International Journal of Computer Engineering and Technology, 6(10), 2015, pp. 13-16. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=6&IType=10 1. INTRODUCTION Each association ought to be worried about securing information against interlopers, for the association’s capacity to survive relies on upon the accessibility, completeness
  • 2. P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan http://www.iaeme.com/IJCIET/index.asp 14 editor@iaeme.com and dependability of its monetary and hierarchical information. Security has turned out to be more entangled with the extended utilize and systems administration of PCs. At present, the neighborhood systems and the associations between the extensive and little PCs are such that each of them tunes in the application. The application overall gives off an impression of being situated on the client’s PC, yet indeed every client and every application has entry to, and now and then even control over, hierarchical information on different PCs and storerooms. Clearly, such openness welcomes unapproved utilize, and requires information security coordination and administration (Appelton, 1997). Tragically, numerous organizations don’t manage information security and system administration issues until there is a break in the system. To ensure indispensable data, the organizations must set up a sound security framework before the system is barged in. This includes distinguishing proof of the security dangers, applying adequate method for security, and showing the clients information security mindfulness. 2. DISTRIBUTED SYSTEMS The most imperative piece of conveyed frameworks is its joint information system which is the operational hub of the association and has a tendency to develop with the association’s advancement furthermore, the advancement of innovation. Now and again the system will join various autonomous associations with administration and different servers to shape the circulated framework. For instance, it is conceivable to portray an authoritative system in an extensive association with countless and divisions (Bellovin, 1997). 3. CLIENT/SERVER SYSTEMS Conventional disseminated frameworks empower clients to utilize information and applications on removed systems without limiting them to systems that they are specifically associated with. In customer/server frameworks the customary usefulness of the centralized computer is separated into two: A client interface and a core of one or more applications enacted at the fringe station characterized as a “customer”. Management of the database and piece of the application enacted on another framework defineda a “server”. Through this division every segment in the system may do the work for which it is generally suited. The two sections of the application are associated by means of unique programming empowering exchange of messages between the customer and the server. Customer/server applications are extremely adaptable and permit clients to get to databases on different systems all by means of a realistic interface, which does not exist on centralized computer frameworks (Neuman, 1998). 4. DATA SECURITY MANAGEMENT – GENERAL PROBLEMS Sadly, advancement of information security in appropriated frameworks happens at the same time with the system’s improvement, as depicted previously. Advancement in stages may bring about an increment of the touchy focuses in the system security, as depicted hereunder (Sanders, 2000). In some non programmed security subsystems, manual login systems power clients to sort their client name and secret key. Not just does this make the framework wasteful, it even uncovered the information security system, for the clients frequently record their secret word on paper beside their working station, for anyone passing by to view (White, 1999). Moreover, most clients
  • 3. A Review on Data Security in Distributed System http://www.iaeme.com/IJCIET/index.asp 15 editor@iaeme.com don’t make a propensity for changing their passwords now and again and keep utilizing the same secret key again and again. 5. DEVELOPMENT OF AN ACCESS SECURITY SYSTEM MODEL In this an exploration’s piece we will display a model for an entrance security framework working in a neighborhood situation (LAN) with numerous stations and clients. The model is for applications going for consolidating access security components in an applications’ piece which will render client sectionalizing administrations, supply passwords and approval to clients and stations of the system. The model is for the most part suitable for frameworks in which the administrators utilize an extensive number of inquiries and exchanges overhauling/cancelation/expansion which must be sectionalized and arrange clients access. As a case we may utilize the information framework at a bank office. The framework incorporates an extensive number of inquiries and bank exchanges actuated by representatives at the branch as per the different divisions. Sectionalization of the exchanges and clients at the branch may be as per the chain of importance at the branch: administrator, representative director, office chiefs, agents - or as indicated by the offices’ way: outside coin, securities, current records and so on. An agent at the present records division will have the capacity to complete current record exchanges just, while different exchanges are hindered to him. The model we exhibit here offers the full answer for these sorts of frameworks. Figure 1 The Distributed Security Approach 6. ARCHITECTURE OF THE ACCESS SECURITY SOFTWARE The entrance security server is made from a number out of layers and levels managing the different parts of the product.  The correspondence layer: Deals with correspondence opposite the customers, getting messages and sending answers.  The discussion layer: Deals with recognizable proof and investigation of the messages got from customers, groups the messages and isolates them into the different parameters. This layer likewise builds the customer’s answer transmission.  The application layer: Operates on three principle levels: taking care of solicitations for administrations with respect to the client (definition, examination, cancellation),
  • 4. P. Deepa Lakshmi, J. S. Praveen, V. Venkatraman and Dr. N. Manoharan http://www.iaeme.com/IJCIET/index.asp 16 editor@iaeme.com taking care of demands for administrations with respect to the station and taking care of solicitations for exchange administrations. The administrations rendered consent to the solicitations the customer may do, which were depicted in the discussion layer on the customer’s side. The application layer is helped by an extra sub-layer of documents administrations which supply every one of the exchanges required for doing on the framework’s records, for example, pursuit, overhaul, scratch off, commercial, close and so on. Figure 2 Software architecture based on the Client/Server 7. CONCLUSION The worries numerous associations have for shielding their information and applications from interlopers in an extensive number of clients environment, can be disposed of or possibly constricted. Another and imaginative approach to do as such is through the usage of an entrance security model. The model created in this exploration is a novel access security model with a customer/server application. To date, the different models for information access security in a circulated framework have not gave a powerful and far reaching arrangement managing every one of the perspectives and levels of the modernized frameworks acting in the customer/server environment. REFERENCES [1] Amoroso, E. Fundamentals of Computer Security Technology, ch. 7, Englewood Cliffs, NJ: Prentice-Hall, 1994. [2] Appelton, K. and Elain, L. Network Security: Is Your LANsafe? DATAMATION, 39, 1997, pp. 45-49. [3] Bellovin, S. and Cheswick, W. (1997), Network Firewalls, IEEE Communications Magazine, September 1997, pp. 65-70. [4] Burleson, D. Managing security in a distributed database environment, DBMS, 8, 1998, pp. 72-77. [5] Clifford, R., Neuman, B. and Theodore Ts’o (1998), Kerberos: An Authentication Service For Computer Networks, IEEE Communications Magazine, September 1998. [6] Elliot, P., Pretty Good Privacy (PGP), Electronic Frontiers Houston, Internet (http://www.efh.org)