A Review On Security Issues in Distributed Systems
A Review On Security Issues in Distributed Systems
A Review On Security Issues in Distributed Systems
ISSN 2229-5518
Abstract— Development of secured and trusted distributed systems is a critical research issues. This paper is a contribution towards th e
summerization of work carried out in this field as well as identifies new research lines. Several approaches about security aspects in
distributed systems have been discussed, like authentication based approaches, development of trust based models, access control based
approaches, etc. A summarization of these issues is given in conclusion section. Apart from this, many research lines about secure
distributed systems are discussed.
Index Terms—Distributed System Security, authentication, cryptography, quorum, mobile agent, trust based models, access control.
—————————— ——————————
1 INTRODUCTION
theory based trust model (ExDSTM) is developed in [17]. Other The actual integration of security policies in distributed systems
D-S theory models are proposed in [18, 19, 20]. has been discussed in [25]. These security policies are manually
A dynamic and context sensitive trust based security mechanism configured and automatically enforced to the distributed system.
has been developed in [21].
A risk management has been integrated into security by using a 2.6 Pattern Based Security
trust model in [8].This model shows that the risk management
can be applied to maximize the utilization of the distributed sys- Various types of security patterns for distributed system security
tem. This model has the utility to evaluate the trust, also. are received in [26] .Various types of pattern based security
methodologies are well discussed and their maturity and appro-
2.3 Access Control Based Security priateness are evaluated.
A path authentication technique has been proposed in [1]. An on 2.7 Quorum Based Security Systems
demand path discovery algorithm has been proposed to enable
domains to securely discover paths in the collaboration environ- Quorum systems are highly applicable for solving the problem of
ment. data consistency in distributed fault-tolerant systems in [27], an
A transport scheme for tracking the availability of entities in dis- Intrusion – Tolerance Quorum System [ITOS] of hybrid time
tributed systems has been proposed in [2]. model based on Trust Timely Computing Base (TTCB) has been
Heterogeneous distributed systems are highly applicable in vari- proposed.
ous applications, like electronic transaction processing systems, A role based access control model has been developed in [28].
stock quote update systems which are requiring a highly efficient The Role Ordering (RO) schedulers are introduced along with
integration of authentication, integrity and confidentiality. A sys- concurrency control based on significance of roles assigned to the
tematic security driven scheduling architecture has been designed transactions.
in [3]. This technique has been proposed for DAG (Direct
2.8 Other Security Based Approaches
Acyclic Graph).The approach dynamically measures the trust of
each node. A mobile agent based security model has been proposed in
The authentication of remote client is an important research area [29].This model explains and analyze the strength of security and
in the distributed systems. A three factor based authentication various threats.
approach for this purpose in [4]. In this, a two factor authentica- The ability of the system to detect the illegal behaviours and fight
tion has been extended to three factor authentication; it ensures back in intrusion with counter measures is called self protection.
the client privacy efficiently in distributed systems. The three A methodology for assessing, implementing and evaluating the
factors used to develop this approach are, password, smart card self-protected system has been proposed in [30].
and biometrics. The efficient collaboration in between security and privacy for
In [5], various aspects of the security in distributed systems has distributed system security has been discussed in [31].
been given including, user authentication using passwords and The design of distributed security systems can be optimized. Ge-
digital certificates and confidentiality in data transmission. netic algorithm has been utilized for this purpose in [32].
The role of authentication servers in distributed computing sys- A security heterogeneity approach for scheduling model in the
tems has been discussed in [6].The main design issue are the distributed system has been developed in [33]. A novel heuristics
cryptographic algorithms, synchronization and amount of trust. scheduling algorithm has been proposed, which strives to maxi-
A secured password based authentication with a trusted third mize probability that all tasks are executed without any risk asso-
party is developed in [7]. The approach is based on well-known ciated with attack.
authentication protocol, called KerberOS. In [34] XtremWeb architecture has been discussed which consists
2.4 Cryptography Based Approaches of computing functioning in a large scale distributed systems.
A framework of security in a distributed system mainly consider- The architecture of the system and parallel programming para-
ing a device level system control has been proposed in [22]. Pub- digms are discussed very well.
lic key cryptography, software agents and XML binding tech- A proposal for secure transaction in mobile system based on
nologies are considered for this approach. delegate object model in [35].It focuses on the challenging issue
The development of secure distributed systems uses various ap- of distributed nature in modern computer systems.
The RAIN technology is discussed in [36], which is a research
proaches, like Public Key Infrastructure (PKI) and Role Based
collaboration between Caltech and NASA-JPL on distributed
Access Control (RBAC). In [23], RBAC approach has been used
to develop authentication based on Public Key Certificates computing and data storage systems for future borne missions.
(PKC). Several proof of concept applications are developed: like, highly
available web server, video server, distributed check pointing
2.5 Policy Based Approaches system.
A policy based distributed system security mechanism has been Legal Information Flow (LIF) scheduler is proposed in [37] to
developed in [24]. This framework provides modular security synchronize transactions so as to prevent illegal information
policies and independent of underlying system .This framework flows.
is based on domain-specific language for specification, verifica-
tion and implementation of distributed system security policies.
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012 3
ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012 4
ISSN 2229-5518
privacy in distributed systems, IEEE Transactions on Parallel and Software Integration and Reliability Improvements, pp. 150-158,
Distributed Systems, vol. 222, no.8 2011, pp.1390-1397. 2009.
[5] K. Vieira, A. Schulter, C. B. Westphall, C. M. Westphall, IT profes- [25] H. Hamdi, A. Bocehula, M. Mosbah, International Conference on
sional ,vol. 12 no. 4, 2010, 38-43. Emerging security Information , systems and technologies 2007,
[6] D. Gollmann, T. Beth, F. Damm, Authentication services in distrib- pp.187-192.
uted systems, Computers and Security , vol. 12, no. 8, Dec.1993, [26] A. V. Uzunov, E. B. Fernandez, K. Falkner, Securing Distributed
pp.753-764. systems using patterns: a survey, Computers and Security ,in press,
[7] W. J. Seung, J. Souhan, Secure Password authentication for distrib- http://dx.doi,org/10.1016/j.cose.2012.04.005.
uted computing, International Conference on Computational Intelli- [27] H. Zhou, X. Meng, L. Zhang, X. Oiao, Quorum systems for intrusion
gence and Security, 2006, vol.2, pp.1345-1350. tolerance based on trusted timely computing base, Journal of Sys-
[8] C. Lin, V. Varadharajan, Trust based risk management for distributed tems, Engineering and Electronics, vol 21, no.1 pp.168-174,2010.
system security-a new approach, First International Conference on [28] E. Tomoya, T. Makoto, Con-currency control based on significance
Availability, Reliability and Security, 2006, ARES 2006. on roles; 11th International Conference on Parallel and Distributed
[9] Y. Bai, On distributed system security, International Conference on Systems, vol. 1, pp.196-202.
Security Technology, 2008, 54-57. [29] L. Qi, L. Yu, Mobile agent based security model for distributed sys-
[10] H. Koshutanski, A survey on distributed access control systems for tem, 2001 IEEE International Conference on Systems, Man and Cy-
web business process, International Journal of Network Security, vol bernetics, vol. 3, pp. 1754-1759, 2001.
9, no.1, pp.61-69, July 2009. [30] N. De Palma, D. Hagimont, F.Boyer, L. Broto, Self protection in a
[11] D. Chadwick, A. Oterko, E. Ball, Role base access control with X.509 clustered distributed systems, IEEE Transactions on Parallel and Dis-
attribute certificates, IEEE Internet Computing, 7(2), pp. 62-69, tributed Systems, vol. 23, no. 2, 2012, pp. 330-336.
Mar/Apr. 2003. [31] S. S. Hau, P. A. Bonatti, F. Dengguo, B. Thuraisingham, Security and
[12] R. Oppliger, A. Grenlich, P. Trachsel, A distributed certificate man- privacy in collaborative distributed systems, 29 th Annual Interna-
agement system(DCMS) supporting group based access control, in tional Computer Software and Applications Conference, 2005 ,vol. 1.
Proc. 15th IEEE annual computer security application conference [32] P. Bykoyy, Y. Pigovsky, V. Kochan, A. Sachenko, G. Morkowsy, S.
(ACSAC’99) ,241-248,1999. Aksoy, Genetic algorithm implementation for distributed security
[13] K.Seamons, W. Winsbotough, Automated trust Negotiation Techni- systems optimization,2008 IEEE International Conference on Compu-
cal Report, Us Patent and Trade Mark office,2002,IBM Corporation, tational Intelligence for Measurement Systems and Applications,
Patent application field Max7,200. pp.120-124, 2008.
[14] W. Yao, Fidelis: A policy driven trust management framework in [33] T. Xie, X. Qin, Performance evaluation of a new scheduling algorithm
iTrust, LNCS 2692, pp. 301-314, Springer-Verlag, 2003. for distributed systems with security heterogeneity, Journal of Paral-
[15] Blaze M, Feigonbaum. J., Ioannidis J., Keromyties, A.D., The role of lel and Distributed Computing, vol. 67, no.10, Oct. 2007, pp.1067-
trust management in distributed system security in secure internet 1081.
programming: Security issues for mobile and distributed objects, [34] F. Cappello, S. Ojilali, G.Fedak, T. Herault, F. Magniette, U. Nen, O.
Vitek and Nensen, Editors, 1999, Springer-Verlag, Lodygensky, Computing on large-scale distributed systems: Xtream
http://www.Dgpter.com/papers/networksec.pdf. web architecture, programming models, security, tests and conver-
[16] H. Li, M. Singhal, Trust Management in distributed systems, Com- gence with grid, p2p computing and interaction with grid,
puter, vol. 40, no. 2 2007, pp. 45-53. 21(3),2005,417-437
[17] L. Jiang, J. Xu, K. Zhang, A new evidential trust model for open dis- [35] N. Shenbagavadivu,S. Usha Savithri ,Enhanced Information security
tributed systems, Expert systems with applications,39(3),2012,3772- in distributed mobile system based on delegate object model, Pro-
3782. cedeia Engineering, vol. 30, 2012, pp. 774-781.
[18] L. D. Huang, G. Xue, X. L. He, H. L. Zhuang, A trust model based on [36] V. Bohossian, C. C. Fan, P. S. Lemahieu, N. D. Riedel, L. Xu, J. Bnick,
evidence theory for P2P systems, Applied Mechanics and Materials, Computing in the RAIN : a reliable array of independent nodes, IEEE
20 (23), 2010, pp. 99-104. Transactions on Parallel and Distributed Systems, vol. 12, no.2, pp.
[19] J. Wang, H. J. Sun, A new evidential trust model for open communi- 99-114, 2001.
ties, Computer Standards and Open Interfaces, 31(5), pp.994-1001, [37] T. Enokido, M. Takizawa, A Legal Information Flow (LIF) scheduler
2009. for distributed systems, International Conference on Parallel and Dis-
[20] B. Yu, M. P. Singh, An evidential model of distributed reputation tributed Systems, 2007, vol. 2, pp. 1-8, 2007.
management, First International Joint Conference on Automous [38] J. Y. Vhoi, Z. Y. Li, H. Y. Yaun, O. Song, Privacy protection in service
Agents and Multiagent Systems, AAMAS, 2002 discovery for large scale distributed computing systems, IEEE Inter-
[21] Y. Ding, F. Liu, B. Tang, Context sensitive trust computing in distrib- national Symposium on Parallel and Distributed Processing Work-
uted environments, Knowledge Based Systems, vol. 28, pp.105-114, shops and Ph. D. Forum (IPDPSW), 2011, pp.1025-1032.
2012. [39] R. T. Di Piero, L. V. Mancini, A. Mei, Towards threat adaptive dy-
[22] Y. Xu, L. Korba, L. Wang, Q. Hao, W. Shen, S. Lang, A security namic fragment replication in large scale distributed systems, IEEE
framework for collaborative distributed system control at the device International Symposium on Parallel and distributed processing
level, IEEE International Conference on Industrial Informatics, 2003, ,2007, pp. 1-2.
pp.192-198. [40] K.-A. Chang, B.-R. Lee, T.-Y. Kim, Open authentication model sup-
[23] W. Chang-Ji, W. Jian-Ping, D. Hai-Xin, Using attribute certificate to porting electronic commerce in distributed computing electronic
design role- based access control, 4 th International Conference on commerce research, 2002, vol. 2, no.1-2, pp. 135-149.
Parallel and Distributed Computing, Applications and Technologies, [41] A.V. Bovoselov, V. E. Ansiperov, A. A. Nikitov, Information protec-
2003, pp.216-218, 2003. tion in distributed systems with the help of different layer protocols,
[24] H. Hamdi, M. Mosbah, A DSL framework for policy based security Journal of Communications Technology and Electronics, vol. 52, no.
of distributed systems, 3 rd IEEE International Conference on Secure 10, pp. 1133-1136, 2007.
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 9, September-2012 5
ISSN 2229-5518
IJSER © 2012
http://www.ijser.org