CFP last date
20 May 2024
Reseach Article

A New Collaborative Trust Enhanced Security Model for Distributed System

by Aruna Kumari, Shakti Mishra, D.S. Kushwaha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 26
Year of Publication: 2010
Authors: Aruna Kumari, Shakti Mishra, D.S. Kushwaha
10.5120/470-776

Aruna Kumari, Shakti Mishra, D.S. Kushwaha . A New Collaborative Trust Enhanced Security Model for Distributed System. International Journal of Computer Applications. 1, 26 ( February 2010), 117-124. DOI=10.5120/470-776

@article{ 10.5120/470-776,
author = { Aruna Kumari, Shakti Mishra, D.S. Kushwaha },
title = { A New Collaborative Trust Enhanced Security Model for Distributed System },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 26 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 117-124 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number26/470-776/ },
doi = { 10.5120/470-776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:57.957529+05:30
%A Aruna Kumari
%A Shakti Mishra
%A D.S. Kushwaha
%T A New Collaborative Trust Enhanced Security Model for Distributed System
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 26
%P 117-124
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Designing a distributed system with the characteristics of reliability and trustworthiness is an important issue. Yet another important issue in the distributed system is the access of remote system which can be achieved on the basis of certain access rights, policies or authorization semantics. The aim of this paper is to establish a collaborative trust enhanced security model for distributed system in which a node either local or remote is trustworthy. This paper also provides a promising solution with trust policies as authorization semantics. While designing a new secure distributed system, it has been observed that mostly the new nodes joining the system are insecure. If these perfidious nodes are provided full authorization, they can perform malicious activities in the system. In the proposed solution, node registry and service level agreements are used to ensure the trust for a new client node. Kerberos, a network authentication protocol is also used to ensure the security aspect when a client requests for certain services. In the proposed solution, we have also considered the issue of performance bottlenecks. A Reactive agent system is proposed to balance the load of service providers with the aim of enhancing the performance of the distributed system.

References
  1. Ming He, Aiqun Hu and Hangping Qiu, " Research on secure key techniques of trustworthy distributed systems", in International Conference on Computer Engineering and Technology, 2009.
  2. Ming He, Aiqun Hu and Hangping Qiu, "Research on behaviour trust based on trustworthy distributed system", in International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.
  3. Peter C. Chapin, Christian Skalka and X. Sean Wang, "Authorization in trust management : features and foundations", in ACM Computing Surveys, August 2008.
  4. Ping Liu, Rui Zong and Sizuo Liu, "A new model for Authentication and Authorization across Heterogeneous Trust-Domain" in International Conference on Computer and Software Engineering, 2008.
  5. Tomoya Enokido and Makoto Takizawa, "Role based access control in Distributed Object Systems", in International Conference on Distributed Computing Systems Workshps, 2008.
  6. Phillip L. Hellewell, Timothy W. van der Horst and Kent E. Seamons, "Extensible Pre-authentication in Kerberos", in Annual Computer Security Applications Conference, 2007.
  7. Hedi Hamdi, Mohamed Mosbah and Adel Bouhoula, "Domain specific language for securing distributed systems", in Second International Conference on Systems and Networks Communications, 2007.
  8. Huaizhi Li, Mukesh Singhal, "Trust Management in Distributed Systems,", in Computer, vol. 40, no. 2, pp. 45-53, 2007.
  9. Serhiy Skakun and Nataliya Kussul, "An agent approach for providing security in distributed systems", TCSET' 2006.
  10. Ching Lin and Vijay Varadharajan, "Trust based risk management for distributed system security- a new approach", in Proceedings of the First International Conference on Availability, Reliability and Security, 2006.
  11. Jaeger, T., McDaniel, P., St. Clair, L., Cáceres, R., and Sailer, "Shame on trust in distributed systems", in Proceedings of the 1st USENIX Workshop on Hot Topics in Security (Vancouver, B.C., Canada). USENIX Association, Berkeley, CA, 4-4, 2006.
  12. C.Neuman, T. Yu, S.Hartman, and K. Raeburn. RFC 4120: The Kerberos Network Authentication Service (V5), Jul 2005.
  13. Wen Tei-hua, Gu Shi-wem, " An improved method of enhancing Kerberos protocol security", Journal of China Institute of Communications, Vol 25 No. 6. June 2004, pp. 76-79.
  14. Matt Blaze, Joan Feigenbaum, John Ioannidis and Angelos D. Keromytis, " The role of trust management in distributed systems security", in Secure internet Programming: Security Issues For Mobile and Distributed Objects, J. Vitek and C. D. Jensen, Eds. Lecture Notes In Computer Science. Springer-Verlag, London, 185-21, 2001.
  15. Fred B. Schneider, Steven M. Bellovin and Alan S. Inouye, "Building trustworthy systems: Lessons from the PTN and Internet", IEEE Internet Computing, November- December 1999.
  16. Marvin A.Sirbu and John Chung-I Chuang, " Distributed authentication in Kerberos using public key cryptography", in sndss, pp.134, 1997 Symposium on Network and Distributed System Security, 1997.
  17. Nicholas Yialelis, Emil Lupu and Morris Sloman, " Role-based security for distributed Object Systems", in Proceedings of WET ICE, IEEE, 1996.
  18. B.Clifford Neuman and Theodore Ts'o, " Kerberos: an authentication service for computer networks", in IEEE Communications Magazine, 1994.
  19. Neuman C. RFC 1510, "The Kerberos network authentication service (V5)", [S]. 1993.
Index Terms

Computer Science
Information Sciences

Keywords

Kerberos Service level agreement Capability list Agent System