StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Distributed Systems Security - Essay Example

Cite this document
Summary
The author of this essay "Distributed Systems Security" comments on new possibilities on the sharing of information. It is mentioned that when designing a distributed file sharing system, one has to consider a design system that meets the following major challenges…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Distributed Systems Security
Read Text Preview

Extract of sample "Distributed Systems Security"

Distributed Systems SecurityIntroductionThe efficiency of internet access to the majority has paved way for new possibilities on the sharing of information. This has also been faced by several challenges in terms of scale and security. When designing a distributed file sharing system, one has to consider a design system that meets the following major challenges (Borghoff, 1992). A good distributed file sharing system has designs considerations such as: • Untrusted storage devices• No central manager or client communication• Independent security domains• Strong mutual authenticationThe system being a shared file distributed system data must be stored on the network for easier access by other clients on the network.

However in this system one should make sure that the data storage devices are secure and trusted. Client and data encryption are highly recommended on the storage devices which means that corresponding blocks of data corresponds both in the directory and the file but does not know content interpretation, below are the various methods of ensuring secure distributed file system. Secure file serversThe initial secure distributed file sharing system was the use of AFS which was later followed by the use of DFS.

In the AFS system, servers store data on sub trees in the file system and use the Kerberos in the provision of the authenticated access to all trees. Every server is the one in management of the meta-data which has full access to the file data. The DFS advanced in the option link in the encryption level in order to prevent the eavesdroppers from the discovery of file systems content (Kistler, 1995). This file server has improved the security of the NFS by providing the ability to encrypt the traffic in between the server and its clients by doing a strong authentication; the NFS has access to data by managing the entire file server.

LoginThe security of a distributed file system calls for the use of unique and assigned id for every user in the system. This name must be used in line to a password created in the system, which helps the user to gain access in the system. This prevents unauthorized users to go into the system. AuthenticationDistributed file systems requires a security protocol to check and verify the login names and password on protection to the systems file from illegal access, this makes the system to improve its security.

Access controlEvery user on the system must have a personal profile in which allows them to gain access to certain areas of the programs and files within the distributed system. This protocol assists in keeping the system’s information and data confidential.System designThe major role of a good system design is to address the security shortcomings in a distributed file system by preserving the performance and the flexibility of a distributed file system (Swain, 1998). In the design factor, factors such as the processor speed of the systems determine the amount of time required by both the server and the client.

By doing so, the distributed file system is a secure because the interaction between the client and the server is synchronous and interactive one.ReferencesBorghoff, U. M. (1992). Catalogue of distributed file/operating systems. Berlin: Springer-Verlag. Kistler, J. J. (1995). Disconnected operation in a distributed file system. New York: Springer. Swain, K. (1998, July 26). What Is Security in Distributed Systems? | eHow.com. eHow | How to Videos, Articles & More - Discover the expert in you. | eHow.com.

Retrieved March 4, 2013, from http://www.ehow.com/facts_7679246_security-distributed-systems.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Distributed Systems Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Distributed Systems Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1616685-distributed-systems-security
(Distributed Systems Security Essay Example | Topics and Well Written Essays - 500 Words)
Distributed Systems Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1616685-distributed-systems-security.
“Distributed Systems Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1616685-distributed-systems-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Distributed Systems Security

Fundamentals of Cryptology

At the base of all internet communication and data security lays cryptology that serves as the foundation to security and data authenticity.... Digital systems basically act as proof of ownership of digital content otherwise susceptible to alterations....
8 Pages (2000 words) Research Proposal

Design a system to pay the credit card bills via handset

security is a major concern for electronic transactions.... If the issue of security is well managed, this mode of transacting will be widely used.... This mobile service is preferred by individuals due to ease of use and the access opportunities to a wide variety of personalized services....
18 Pages (4500 words) Essay

Distributed File Systems

This paper ''Distributed File systems'' tells that Distributed file systems allow users to share the resources of a network including storage.... 22) points out that the design and implementation of distributed file systems face many challenges such as caching techniques, naming service and transparency, file replication, access control and scalability considerations, and support for concurrency and availability....   The main challenges in designing and implementing distributed file systems: Adrian, Teodora, and Naina (2011, p....
8 Pages (2000 words) Essay

Information Technology Architectures

Distributed Systems Security issues, processes, and solutions.... distributed systems architecture also facilitates use of software and equipment from different vendors.... distributed systems are typically more complex than centralized ones and are extremely susceptible to external attack hence poor security.... Oracle's network facilities allow applications and databases to reside on different computers with different operating systems at the same time communicating as peer applications (Belapurkar, 2009)....
2 Pages (500 words) Essay

Advantages of Distributed Operating Systems

These… The process of developing and using distributed systems actually erodes these benefits. First, evidence shows that distributed operating systems pose major security risks to the system.... The process of developing and using distributed systems actually erodes these benefits.... For instance, the design of distributed systems is such that a malicious program can easily be replicated across a large number of machines, and this can result in major damage (Moffett, 2004)....
2 Pages (500 words) Assignment

Internet Usages Affect People's Tourism Booking And Decision-making

This paper talks that marketers have the access to technology with the advent of the internet to customize products and communicate directly with the smaller target market.... The internet is an interactive medium unlike the traditional marketing.... hellip; This essay will cover the influence of the internet and consumer behaviour in the tourism industry....
7 Pages (1750 words) Essay

What Is a Distributed Database

The main advantages of using think clients are security, efficient use of resources, and low cost (Kumar 2007).... This assignment "What Is a Distributed Database" sheds some light on the word client-server that refers to an accepted model for networking of computer systems that makes use of server and client devices which are designed for their respective purposes.... ldquo;A distributed database is a database that is split over multiple hardware devices but managed by a central database controller” (Holmes n....
6 Pages (1500 words) Assignment

Network Security: Kerberos

o use Kerberos in computer security systems, one must authenticate with a Kerberos server to gain access to the key server.... uthenticationKerberos security system uses key distribution center (KDC) to safeguard data and information from access to unauthorized users.... The key distribution center maintains a copy of every password associated with every password associated with every principal and hence it is very important that the key distribution center be under tight security....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us