IMPLEMENTATION OF ADHOC NETWORK TO ENABLE CENTRALIZED AND DISTRIBUTED COMPUTING
Keywords:
Centralized System, Distributed systems, Cryptography, Encryption, DecryptionAbstract
This Research presents a comparative study of distributed and centralized systems and the security issues associated with those systems. Four commonly used distributed systems were considered for detailed analysis in terms of technologies involved, security issues faced by them and solution proposed to circumvent those issues. Finally the security issues and the solutions were summarized and compared with each other. When systems work in this collaborative fashion with other systems that are geographically scattered over wide distance it is commonly known as a distributed system. In literature, researchers have used diverse definitions to outline what a distributed system is.
References
Bart Preneel, “The Cryptographers’ Track at the RSA conference”, 2005, Lecture notes in computer Science3376, springer-Verlag, pp. 29-43, extended version: http://eprint. iacr.org/2004/222/. [2] Ilango Sriram, “Distributed, Parallel and Cluster computing”, 2009, a Simulation Tool Exploring Cloud-Scale Data Centres, In: CloudCom 2009, LNCS 5931, pp. 381-392, 2009 [3] S erotavaGesevone, “ Akamai Introduces Cloud-Based Firewall Provides a scalable edge defense system for blocking Web application attacks in the cloud”, 2009. http://cloudcomputing.sys-con.com/node/1219023. [4] Peter mill and Tim grance, “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards and Technology ,Gaitherbsburg,MD 20899-8930, NIST Special Publication 800-145. [5] Ellen Messmer, “New security demands arising for virtualization, cloud computing”, 2011, http://www.networkworld.com/article/2178628/virtualization/gartner--new-security-demands-arising-for-virtualization--cloud-computing.html
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.