CFP last date
20 January 2025
Reseach Article

Performance Security in Distributed System: Comparative Study

by Chliah Hanane, Amal Battou, Omar Baz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 15
Year of Publication: 2018
Authors: Chliah Hanane, Amal Battou, Omar Baz
10.5120/ijca2018916131

Chliah Hanane, Amal Battou, Omar Baz . Performance Security in Distributed System: Comparative Study. International Journal of Computer Applications. 179, 15 ( Jan 2018), 29-33. DOI=10.5120/ijca2018916131

@article{ 10.5120/ijca2018916131,
author = { Chliah Hanane, Amal Battou, Omar Baz },
title = { Performance Security in Distributed System: Comparative Study },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 179 },
number = { 15 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number15/28878-2018916131/ },
doi = { 10.5120/ijca2018916131 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:55:28.155608+05:30
%A Chliah Hanane
%A Amal Battou
%A Omar Baz
%T Performance Security in Distributed System: Comparative Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 15
%P 29-33
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a comparative study of distributed systems and the security issues associated with those systems. Three commonly used distributed systems were considered for detailed analysis in terms of technologies involved, security issues faced by them and solution proposed to circumvent those issues.

References
  1. G. F. Coulouris, Ed., 2012, Distributed systems: concepts and design, 5th ed. Boston: Addison-Wesley.
  2. A. S. Tanenbaum and M. van Steen, 2007, Distributed systems: principles and paradigms, 2nd ed. Upper Saddle RIiver, NJ: Pearson Prentice Hall.
  3. “Beowulf.org | Mailing List and Archives.” [Online]. Available: http://www.beowulf.org/. [Accessed: 30-Jun-2017].
  4. “High Performance Virtual Machines.” [Online]. Available: http://cseweb.ucsd.edu/groups/csag/html/projects/hpvm.html. [Accessed: 30-Jun-2017].
  5. T. E. Anderson, D. E. Culler, D. A. Patterson, and and the N. team, “A Case for NOW (Networks of Workstations),” IEEE Micro, vol. 15, no. 1, pp. 54–64, Feb. 1995.
  6. N. Sadashiv and S. D. Kumar, “Cluster, grid and cloud computing: A detailed comparison,” in Computer Science & Education (ICCSE), 2011 6th International Conference on, 2011, pp. 477–482.
  7. P. Purnawansyah and R. Sastra, 2016, “Cluster Computing Analysis Based on Beowulf Architecture,” Int. J. Comput. Inform. IJCANDI, vol. 1, no. 1, pp. 9–16.
  8. “A Comparative Analysis- Grid, Cluster and Cloud Computing.pdf.” .
  9. I. Foster, Y. Zhao, I. Raicu, and S. Lu, 2008, “Cloud Computing and Grid Computing 360-Degree Compared,” , pp. 1–10.
  10. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, 2009, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comput. Syst., vol. 25, no. 6, pp. 599–616,( Jun. 2009).
  11. “Google Docs - create and edit documents online, for free.” [Online]. Available: https://www.google.com/docs/about/. [Accessed: 30-Jun-2017].
  12. “Office Products – Microsoft Office.” [Online]. Available: https://products.office.com/en-us/products?tab=O-Home. [Accessed: 30-Jun-2017].
  13. “Elastic Compute Cloud (EC2) – Cloud Server & Hosting – AWS,” Amazon Web Services, Inc. [Online]. Available: //aws.amazon.com/ec2/. [Accessed: 30-Jun-2017].
  14. “Rackspace: Managed Dedicated & Cloud Computing Services,” Rackspace Hosting. [Online]. Available: https://www.rackspace.com. [Accessed: 30-Jun-2017].
  15. “A Comparative Study of SaaS, PaaS and IaaS in Cloud.pdf.” .
  16. “Office Products – Microsoft Office.” [Online]. Available: https://products.office.com/en-us/products?tab=O-Homehttp://www.tutorialspoint.com/cloud_computing/. [Accessed: 30-Jun-2017].
  17. H. AlHakami, 2012, “Comparison Between Cloud and Grid Computing: Review Paper,” Int. J. Cloud Comput. Serv. Archit., vol. 2, no. 4, pp. 1–21, (Aug. 2012).
  18. M. L. Bote-Lorenzo, Y. A. Dimitriadis, and E. Gómez-Sánchez, 2004, “Grid Characteristics and Uses: A Grid Definition,” in Grid Computing, vol. 2970, F. Fernández Rivera, M. Bubak, A. Gómez Tato, and R. Doallo, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 291–298.
  19. M. Lee, E. J. Kim, K. H. Yum, and M. Yousif, 2006, “An overview of security issues in cluster interconnects,” in Cluster Computing and the Grid, 2006. CCGRID 06. Sixth IEEE International Symposium on, vol. 2, p. 9–pp.
  20. M. Pourzandi, D. Gordon, W. Yurcik, and G. A. Koenig, “Clusters and security: distributed security for distributed systems,” in Cluster Computing and the Grid, 2005. IEEE International Symposium on, 2005, vol. 1, pp. 96–104.
  21. Wei Li and R. B. Vaughn, 2006,“Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs,” pp. 26–26.
  22. S. K. Thalod and R. Niwas, 2013, “SECURITY MODEL FOR COMPUTER NETWORK BASED ON CLUSTER COMPUTING,” Int. J. Eng. Comput. Sci. ISSN, pp. 1920–1927.
  23. “Grid Computing Security Mechanisms the state-of-the-art.ppt.” .
  24. A. Farouk, A. A. Abdelhafez, and M. M. Fouad, 2012, “Authentication mechanisms in grid computing environment: Comparative study,” in Engineering and Technology (ICET), 2012 International Conference on, pp. 1–6.
  25. R. Bhatia, “Grid Computing and Security Isses, 2013, ” Int. J. Sci. Res. Publ., vol. 3.
  26. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, 2013, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, Feb.
  27. A. Diogo et al., 2014, “Security issues in cloud environments: a survey,” Int. J. Inf. Secur., vol. 13, no. 2, p. 113.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Grid and Cluster Computing