Security Management in Distributed Systems
Security Management in Distributed Systems
I, Your name , Your Roll No,certify that the Research Project entitled
“Security Management in Distributed Systems” is done by me and it is
an authentic work carried out by me. The matter embodied in this project
work has not been submitted earlier for the award of any degree or diploma
to the best of my knowledge and belief.
Countersigned
Director/HOD
1
ACKNOWLEDGEMENT
2
TABLE OF CONTENTS
S No Topic Page
No
1 List of Figures:
List of Tables:
2 Chapter-1: Introduction 1
3 Chapter-2: Review of related work 4
4 Chapter-3: Proposed Work 8
5 Chapter 4: SECURITY MECHANISMS IN 9
DISTRUBUTED SYSTEM
6 Chapter 5: SECURITY POLICIES IN DISTRIBUTED 15
SYSTEM
7 Chapter 6: SECURITY STANDARDS IN 24
DISTRIBUTED SYSTEM
8 Summary/Conclusion 28
9 References 29
3
CHAPTER 1
INTRODUCTION
Security is the most important issue in the distributed systems. Security has
between the large and small computers are such that each of them takes part
user's computer, but in fact each user and each application has access to, and
4
sometimes even control over, organizational data on various computers and
storage facilities.
many companies do not deal with data security and network management
the companies must set up a sound security system before the network is
sufficient means of security, and teaching the users data security awareness.
Unfortunately, many companies do not deal with data security and network
systems developed rapidly over the past two decades and security can be
measured in the concept in term of hardware aspect and software aspect. The
“hacking” has gone beyond the realm of domestic pranks and has entered the
5
1.1 Objectives of the project:
security.
There are three primary security objectives which apply to both stored data
as follows:
components to ensure that users can only access services, and perform
potential security failure should raise an alarm and cause the system to
1.2 Methodology:
For the development of this system I use the prototyping Model of Software
sample we learn and try to build a better final product. Please note that this
prototype may or may not be completely different from the final system we
model, where requirements are clear). While making the model, user keeps
giving feedbacks from time to time and based on it, a prototype is made.
Completely built sample model is shown to user and based on his feedback,
Here most of the information was collected from the internet from as par
the part of the planning for the organization and was then framed into
8
logical data. Sources all data collection is based on secondary data
collection.
The major site from where the data has been collected is
for my research project and I would consult it for any further information
9
CHAPTER 2
10
security threats that can be mounted against inter process communication in
time.
11
explained that distributed systems face a proliferation of users, applications,
authority, and the interactions that can occur between nodes supporting
12
In April 2006, Lin and Varadharajan proposed the use of trust based risk
In 2009, Benson and G Appelbe, proposed his views on the topic called
presented
14
operation of its interconnected elements. Its contain power generations,
In 2012, the research was published with the name of Garcia, M, “Applying
implement security mechanisms in distributed systems.
15
growing critical challenges of security management and risk control. For the
requirement, the host server is able to refuse to serve for the deadline missed
energy costs analyzed in this paper leaves its significance for the future
16
adaptive to the fluctuation of input workloads and has better performance
CHAPTER 3
PROPOSED WORK
3.1 Definition:
This section discusses the complexity of the problem and the difficulty in
solving
above.
mechanisms force users to type their user name and password. Not
only does this make the system inefficient, it even exposes the data
17
security mechanism, for the users often write down their password on
passwords every so often and continue using the same password over
sites.
CHAPTER 4
system
2. Authentication mechanisms
18
4. Communication security mechanisms
Physical security mechanisms are used for protection of equipment and for
They are necessary for protection against risks such as fire, tempest, terrorist
19
A basic level of physical security is always necessary even in the presence of
may be simpler and more secure than a logical solution, for example, by
malfunction. They are also required for Radiation Security to avoid the
nearby radio receivers and analyzed to reveal the data being displayed,
proofing).
3. AUTHENTICATION
a) Personal Authentication
20
The aim of personal authentication in computer systems is to verify the
mechanisms for it, all based on one or more of the following principles:
encryption key.
implement, and they provide an adequate level of protection for medium and
they are not to be undermined. The measures include, regular change by the
21
example, Payroll clerks may only log on in that capacity using one of the
eavesdropping on the channel and then used to impersonate the user. One
(see below).
cannot be copied so easily and are less easy to forget. However, they also
channels.
provide variable information. There are several modes in which they can be
22
One-time password generators which generate a different password
each time they are used. One commercial product changes the
the smart card has to calculate the correct response, including input
Smart cards are becoming cheaper and easier to use and they promise to
must cope with the problem of protecting the secure information upon which
it is based.
b) Message Authentication
is to verify that the message comes from its claimed originator and that it has
23
recalculated by the receiver and will reveal any alteration in transit. One
attempts and allows them only if the access is authorized. Otherwise the
defining the users who are authorized to access them and the
24
5. COMMUNICATION SECURITY MECHANISMS
traffic padding.
plain text (deciphers it). Cryptography has been practiced for thousands of
Traffic padding will only be dealt with briefly here. Its purpose of is to
25
dummy messages on the line to ensure that there is a uniform level of traffic
the use of unique message identities, the detection of message deletion and
replay.
encryption only covers the communication links, and the information is "in
network, but not the gateways between networks. In all cases where
encryption is carried out by a separate hardware unit, the link between the
terminal and the unit is not covered by encryption, and physical protection is
required in addition.
b) Encryption Algorithms
26
There are two main types of encryption:
Secret key encryption, which uses a single secret key shared between
Public key encryption, which uses a related pair of keys. One key is
other key is secret, known only to the receiver, and may be used to
decrypt messages.
(Davies & Price, 1989). The DES algorithm is available in software and also
chip is subject to export restrictions from the USA, and the hardware is
27
distribution, protection of the key management facility, and protocols for the
cryptographic service.
28
CHAPTER 5
Policies are the plans of an organization to meet its objectives. Within the
organization with regard to security risks, and the plans for dealing with the
the plans of a high-level policy are the objectives which a lower level policy
must address.
plans to meet the goals. These high-level objectives vary substantially from
the integrity of data and messages which represent money. The default for
29
Security policies are not always precisely formulated or written down, but an
effective computer security policy requires that the following questions are
answered:
value?
The security policy for a distributed system should reflect the senior
A high-level security policy can make general statement about the goals of
anticipated cost of threats and the actual costs of security measures. The
threat itself. The results of a risk analysis may help to redefine or focus high-
level policies, as well as define the lower-level policies for managing the
operating system.
31
A. SECURITY INTERACTION POLICIES
because the policies of the systems differ in the level of security they
ISO have recognized this problem and have introduced the concept of a
negotiated between them before they can communicate. The Issues which
have to be resolved between them are both the level of security and the
their communication.
32
An inter-organizational Security Interaction Policy agreed and committed to
by all parties, may be difficult to negotiate because of the need for more
systems.
supporting mechanisms.
33
B. THE PRACTICAL APPLICATION OF ITS SECURITY
POLICIES
could apply to a typical company are described. They are divided into the
following areas:
Security levels,
Communication security,
Disaster planning,
Note first of all the extent and limits of these policies. They include
event of line failures. The exclusion of these areas from security policies is
course essential to ensure that these subjects are covered in one policy
document or another.
Second, these security policies also exclude system change control. This too
35
control should be covered by polices for IT Computer Operations and
Development.
and included in the targets which are set for each department. Only then will
personnel to find out easily what the policies are, there is no possibility of
36
The first recommendation for a company is therefore that the director
responsible for IT obtains Board approval for the creation and enforcement
its Security Administrator, but in order to ensure that the level of security is
the goal of ensuring that each system is working to compatible standards and
procedures. Typically the Security Coordinator has two tasks: ensuring that
37
helping departmental business managers to ensure that they are adhered to
organization, must be to ensure that the net is spread widely enough, every
2. Security levels
package of security measures defined for each level, then detailed decisions
Commercial organizations are likely to define two types of security level: for
data and for users. Most aim to give the same level of protection to all their
data, so that there will only be one security level defined for data. This is
38
much easier to administer than multiple levels and accords with the usual
contract.
categories of users, especially when outsiders are given limited access to the
users, who have the least restricted access, the same users when they dial in,
outsiders, with a similar restriction. Note that this concept of security levels
3. Physical Security
39
Physical security is the basis of all other system security. There should be a
4. Communications security
categories: the security of the corporate networks, and the criteria for
and a defined percentage of availability from the network, but not to insist
with open distributed systems are to do with controlling the access of users
control, with two main parts. The first part states the requirement for unique
40
user identifiers and the need for users to respect them. The second defines
ABC's premises. The policy will state the standards for passwords,
like the minimum length and required format, and the frequency of
change.
The policy for data access control contains the following elements:
the owner being responsible for decisions about the use of the data.
All the data should be protected, and access should only be permitted when
authorized By its owner, All systems should have access control systems
41
level of protection (see section VI.A) is suitable for a commercial
organization.
7. Disaster planning
Most organizations are now critically dependent upon the working of many
of their communications and computer systems. If any one of them fails, the
should define what is the maximum recovery time, and how all of data,
several sites.
There are several reasons for having a policy requiring the audit ability of all
systems that is the ability to trace any significant action which has taken
actions all of the time, so there should be a policy dividing systems and
actions and financial transactions, which should be logged all the time,
events which can be logged whenever necessary, and events which are so
A policy is needed which makes it clear to all staff that all legal and
legislation.
There are many applications in which external organizations are used for
processing an organization’s data, for example EFT and EDI. The policy
data.
43
11. Concluding Comment on the Security Policies
The security policies outlined above are a minimum set for a typical
44
CHAPTER 6
individual computers, which have been in existence for some time, and are
quite mature. The second are standards for the protection of communication
transmission and remote authentication. These too are quite mature. The
third, still under development, are those which integrate computer and
standards.
procedures or requirements for their use. These are all necessary elements to
be considered and resolved for the resources that comprise the whole
possible levels of trust which may be placed in a system, ranging from the
and discretionary access control. The former enforces policies which are
built into the design of the system and cannot be altered except by installing
control mechanisms are defined as those which allow users to specify and
control sharing of resources with other users. For example the C2 level
46
which ensure that information and resources are protected from unauthorized
extends the criteria of the Red Book to networks. It is chiefly concerned with
The Red Book is now quite old and it has always been more oriented to
Criteria (ITSEC) (CEC, 1991). This is a joint undertaking by the UK, Dutch,
French and German governments. Its aim is to take into account the needs of
about security levels from the way in which the security is evaluated. In the
47
products using the criteria of ITSEC. Similar efforts are under way in other
countries.
ENCRYPTION
1. Transmission Security
efforts: the DES algorithm for secret key encryption which is an American,
but not an international, standard. On the other hand, the RSA algorithm for
public key encryption is the subject of USA patents. It has become a de facto
standard for public key cryptography but because of its patented status is not
Encryption depends for its strength upon the security of the hardware which
is used, and (BSI, 86/67937) describes standards for the Physical Security of
Cryptographic Equipment
48
The basic standard for DES is (NBS, 46), supplemented by (ANSI, X3.92).
81) and Guidelines for Installation and Use (NBS, 74), the management of
2. Authentication Standards
general in format and could be used for other purposes. They include (ANSI,
Network security was not a primary concern when the Open Systems
Interconnection (OSI) effort first got under way in the late 1970s. However
there is now a series of ISO standards under development which aim to add
49
security to OSI. The standards define the security services which the
facilities have been defined in the ISO 7498-2 Security Architecture (ISO,
7498-2). The protocols for their provision are still largely under
Authentications,
Access Control,
Non-repudiation,
Integrity,
50
Data Confidentiality,
Audit frameworks,
Key management.
Chapter 7
CONCLUSION
the other hand, adaptation has seen a wide acceptance among researchers
since it has the purpose of presenting a good quality of service to the users of
communication.
51
Chapter 8
REFERENCES
IEEE Trans. Comput., vol. SE- 13, pp. 2290-2235, Feb 2005
52
4. Nessett, D, “A Systematic Methodology for Analyzing Security
Georgia Inst. of Technol., Atlanta, GA, vol 24, pp. 194 – 203, May
2009
Standards Institution.
Luxembourg.
5200.78 - STD).
55