A Novel Security Schema for Distributed File Systems

被引:0
作者
Zarei, Bager [1 ]
Asadi, Mehdi [2 ]
Nourizadeh, Saced [1 ]
Begdillo, Shapour Jodi [3 ]
机构
[1] Islamic Azad Univ, Shabestar Branch, Dept Comp Engn, Tehran, Iran
[2] Islamic Azad Univ, Khamneh Branch, Dept Comp Engn, Khamneh, Iran
[3] Islamic Azad Univ, Parsabad Mogan Branch, Dept Comp Engn, Parsabad mogan, Iran
来源
ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING | 2008年
关键词
Security; DFS1; Fault Tolerance; Fault Recovery; Load Balancing; DES2;
D O I
10.1007/978-1-4020-8741-7_56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed file systems are key tools that enable collaboration in any environment consisting of more than one computer. Security is a term that covers several concepts related to protecting data. Authentication refers to identifying the parties involved in using or providing file services. Authorization is the process of controlling actions in the system both at the user level, such as read and write, and at the administrative level, such as setting quotas and moving data between servers. Communication security addresses the integrity and privacy of messages exchanged over networks vulnerable to attack. Storage security concerns the safety of data "at rest" on disks or other devices. But these are mechanistic approaches to security. At a higher level, the issue of trust of all the parties in each other and the system components control the security decisions. This project is a successful endeavor to make security in distributed file systems. The main object of the paper was to get in depth knowledge about base concepts of distributed file system like fault tolerance, fault recovery, scalability and specifically security.
引用
收藏
页码:305 / +
页数:2
相关论文
共 50 条
[31]   Multi-Level security model in distributed database systems [J].
Bakir, Cigdem ;
Guclu, Mehmet .
PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2022, 28 (02) :266-276
[32]   Latency, Power, and Security Optimization in Distributed Reconfigurable Embedded Systems [J].
Nam, Hyunsuk ;
Lysecky, Roman .
2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2016, :124-131
[33]   Application of Security Metrics to Instrument Systems That Use Distributed Processing [J].
Munro, John K., Jr. .
2011 FUTURE OF INSTRUMENTATION INTERNATIONAL WORKSHOP (FIIW), 2011,
[34]   A FORMAL PROTECTION MODEL OF SECURITY IN CENTRALIZED, PARALLEL, AND DISTRIBUTED SYSTEMS [J].
BENSON, GS ;
AKYILDIZ, IF ;
APPELBE, WF .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1990, 8 (03) :183-213
[35]   Towards Scalable Defense of Information Flow Security for Distributed Systems [J].
Fu, Xiaoqin .
PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19), 2019, :438-442
[36]   State-dependent security decisions for distributed object systems [J].
Biskup, J ;
Leineweber, T .
DATABASE AND APPLICATION SECURITY XV, 2002, 87 :105-118
[37]   Role-based security for configurable distributed control systems [J].
Hauf, M ;
Schwarz, J ;
Polze, A .
SIXTH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2001, :111-118
[38]   A Security Approach for Credential-Management in Distributed Heterogeneous Systems [J].
Hilbrich, Marcus ;
Htinich, Denis ;
Mel, Rene .
INTELLIGENT DISTRIBUTED COMPUTING V, 2011, 382 :219-224
[39]   Policy-based security for distributed manufacturing execution systems [J].
Morariu, Octavian ;
Morariu, Cristina ;
Borangiu, Theodor .
INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2018, 31 (03) :306-317
[40]   DESIGN AND IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM [J].
CHENG, HC ;
SHEU, JP .
SOFTWARE-PRACTICE & EXPERIENCE, 1991, 21 (07) :657-675