StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reputation and Privacy Issues in Distributed Computing - Research Proposal Example

Cite this document
Summary
The paper "Reputation and Privacy Issues in Distributed Computing" states that all the findings will be compared with previous studies on related subjects, which will be sourced from secondary sources such as books, journals, and online research catalogs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Reputation and Privacy Issues in Distributed Computing
Read Text Preview

Extract of sample "Reputation and Privacy Issues in Distributed Computing"

Umar defines distributed programming as a software framework for developing and executing programs that are capable of running on multiple interconnected systems to realize a common task (109).

The origins of Distributed computing can be traced back as far as the 1970s. However, researchers like Katsikas argue that the domain attained an independent identity only during the past 20 years and that there is a wide scope for further research and development (126). While current distributed models are capable of delivering high-speed, on-demand services via a shared pool of resources and can operate with minimal interaction or management, such recent advances have introduced several more dimensions into factors like privacy and data security that are critical when sharing information. Thus, distributed computing is widely regarded as a new programming paradigm that needs further research for better flexibility together with the identification and resolution of all outstanding issues related to information privacy and reputation (Katsikas 54). The proposed study aims to analyze and understand some of these issues and provide some useful solutions that may be incorporated into future implementations of distributed systems. The reasons for undertaking this research and the necessity to understand this specific segment of distributed computing are elaborated in the subsequent sections.
Literature Review

According to Hubner, environments based on distributed computing paradigms are characterized by peer-to-peer networking, ad-hoc communication through connected and mobile devices, social networking, etc (56). While the logical operation of a distributed network is mostly automated and based on a set of rules, the information that flows through these networks and the configuration of these networks are still controlled by human end users. As a result, the element of trust that cannot be controlled by networks themselves becomes a crucial factor and is necessary for authorized and meaningful interaction among users (Hubner 195). Thus, the proper sharing of information across distributed networks is a challenge to network designers and engineers. Petkovic notes that the question of data privacy i.e., how to share information with accurate representation while maintaining the privacy and designated delivery is one of the major questions currently being explored by researchers (187). While many studies have devised effective solutions that tackle privacy or reputation (trust) related issues, Subramanian argues that most of these have explored only a specific area (92).

Thus, there is not much insight when it comes to evaluating both privacy and trust-related methodologies that are capable of collectively solving the overall problem of proper information sharing. Questions remain on the robustness of the current privacy framework and trust models and the extent to which they can cope with a varying range of attacks. Dubitsky adds that existing techniques are not capable of utilizing any human characteristics or transcending beyond the use of trust as a validation of rules (165). The rapid surge in the use of mobile devices in distributed computing has introduced another important complexity into the equation besides raising new issues on reusable identity, ad-hoc access, and transient communication. The growth of social networking over the past 5-6 years has also raised questions on the validity of identities and trust. Umar further adds that in a decentralized environment such as in distributed computing, human involvement is prone to introducing challenges in areas like human-computer interaction (HCI) (86). These multi-dimensional complexities, therefore, open up new areas of study for the development of better protocols on privacy, content sharing, and reputation, which are capable of handling the latest challenges.

Research Objectives & Scope

The proposed study intends to analyze relevant issues such as privacy, trust, filtering, and security in the reliable and trustworthy preservation and transmission of information across distributed networks. In doing so, the study shall devise new models for enabling trust and privacy in modern networks for different parameters ranging from sociological considerations and data consistency to access control and system implementation. More specifically, the study aims to achieve the following core objectives:

• Understand the current issues and scope of existing trust mechanisms and protocols.
• Identify the appropriate tradeoff in privacy/trust for various network scenarios and configurations.
• Provide a comprehensive framework that can accommodate network architecture, software isolation, information availability, and identity management. Accommodate newer technologies such as Web 2.0, platform virtualization, and service-oriented architecture.
• Simulate all new methodologies for various types of intrusion and attacks.

Research Methodology

Both primary and secondary sources of information shall be utilized for the proposed study. Primary research techniques that will be applied include surveys and personal interviews. Surveys will be conducted for a group of personnel involved with distributed computing either as researchers or working professionals. A well-defined questionnaire will be used for this purpose to understand and aggregate individual experiences and perceptions on current issues of privacy and reputation within distributed computing installations. Personal interviews will then be conducted for some key people in this field upon obtaining prior consent. Doing so will facilitate proper follow-up on inferences drawn from the survey method besides helping corroborate the findings in both cases and arrive at some useful conclusions. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Reputation and Privacy Issues in Distributed Computing Research Proposal”, n.d.)
Retrieved from https://studentshare.org/information-technology/1430608-reputation-and-privacy-issues-in-distributed
(Reputation and Privacy Issues in Distributed Computing Research Proposal)
https://studentshare.org/information-technology/1430608-reputation-and-privacy-issues-in-distributed.
“Reputation and Privacy Issues in Distributed Computing Research Proposal”, n.d. https://studentshare.org/information-technology/1430608-reputation-and-privacy-issues-in-distributed.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reputation and Privacy Issues in Distributed Computing

Security issues in delivering infrastructure as a service in cloud computing and business

Cloud computing has emerged as a prominent computing paradigm, that promises to provide a cost and worry free solutions to consumer problems so that they can consume the services provided by the cloud without worrying about the maintenance and updating of the services they are consuming.... Cloud computing has emerged as a prominent computing paradigm, that promises to provide a cost and worry free solutions to consumer problems so that they can consume the services provided by the cloud without worrying about the maintenance and updating of the services they are consuming....
24 Pages (6000 words) Literature review

Cloud Computing Security Models

Cloud computing is known for its efficiency and flexibility in producing services that are able to meet the escalating business needs.... Cloud computing has a wide range of benefits but it also encounters issues regarding security such as application security, access control, virtualization security, identity management and authentication.... … Abstract Cloud computing is known for its efficiency and flexibility in producing services that are able to meet the escalating business needs....
5 Pages (1250 words) Essay

Grid Computing Standards

An example of this computing infrastructure, courtesy of Force10, shows how this cluster/GRID computing network is positioned to utilized these storage devices GRID computing is the transformation of a computer infrastructure into an integrated Virtual Organisation that allows for dynamic collaboration and the ability to share resources from anywhere in the world.... This sharing provides users with an unprecedented amount of computing power, especially for those in the field of scientific investigation and collaboration in which the needs of the computer power cannot necessarily be handled by one such computer....
8 Pages (2000 words) Essay

SWOT Analysis of Apple

However, it is also through this particular fact that some of the major clients of the organization may be lost simply upon knowing that the other parts of the gadgets distributed by the company was not made from the United States or UK.... (Deutschmann, 2000, 43)From this particular fact, it could be observed that it is an essential asset of the corporation to take great concern of the fact that they were already able to establish the right kind of reputation for their carrier brand to make a great impact in the world market....
5 Pages (1250 words) Research Paper

The Development of Technology

Technology has created thousands of jobs; however opportunities still exists in the technology field since new ideas arise each day.... Businesses and… The internet acts as a global network that interconnects computer networks from different individuals and institutions in order to serve many The internet relays a vast array of information and services within the interlinked documents and emails....
8 Pages (2000 words) Essay

Cloud Computing Risks and Security Concerns

This essay "Cloud computing Risks and Security Concerns" reviews the risks associated with cloud computing and based on the three service models of this technology, the security concerns would be evaluated.... nbsp;   … Cloud computing is an emergent technology that has revolutionized the operations of organizations to a great extent.... Cloud computing refers to a model that fosters a convenient, on-demand, and ubiquitous access to a network that is shared by a pool of computing resources that could be configured and that could be provisioned and released rapidly with limited service provider interaction or management effort....
12 Pages (3000 words) Essay

Privacy, Security and Anoymity in P2P networks for Multimedia Distribution: Challenges and Solutions

From another perspective, anonymity and privacy are the vital traits of the P2P networks because they have the potential of discouraging some insecure actions.... Particularly, the study focuses on the technology in the aspect of the security, privacy, and anonymity.... Security, privacy and anonymity in P2P networks are aspects that need critical attention.... However, Traynor argues that some privacy promoting strategies may provide an enabling environment for conducting insecure attacks....
6 Pages (1500 words) Research Paper

Foundations of Business Computing

… The paper "Foundations of Business computing" is a wonderful example of an assignment on information technology.... The paper "Foundations of Business computing" is a wonderful example of an assignment on information technology.... The latest information technology use is cloud computing where all information is processed at one central server.... Answer: Technical knowledge and skills can be the abilities and the knowledge that is required to perform some tasks such as computing, scientific, engineering, and mathematical....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us