Open Access   Article Go Back

Distributed Operating System Security and Reliability

Attah Stella1 , Taylor O.E.2

  1. Department of Computer and Robotic Education, Federal College of Education Technical Omoku, Rivers State, Nigeria.
  2. Department of Computer Science Rivers State University Port Harcourt, Rivers State, Nigeria.

Section:Research Paper, Product Type: Journal Paper
Volume-10 , Issue-12 , Page no. 34-40, Dec-2022

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v10i12.3440

Online published on Dec 31, 2022

Copyright © Attah Stella, Taylor O.E. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Attah Stella, Taylor O.E., “Distributed Operating System Security and Reliability,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.12, pp.34-40, 2022.

MLA Style Citation: Attah Stella, Taylor O.E. "Distributed Operating System Security and Reliability." International Journal of Computer Sciences and Engineering 10.12 (2022): 34-40.

APA Style Citation: Attah Stella, Taylor O.E., (2022). Distributed Operating System Security and Reliability. International Journal of Computer Sciences and Engineering, 10(12), 34-40.

BibTex Style Citation:
@article{Stella_2022,
author = {Attah Stella, Taylor O.E.},
title = {Distributed Operating System Security and Reliability},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2022},
volume = {10},
Issue = {12},
month = {12},
year = {2022},
issn = {2347-2693},
pages = {34-40},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5537},
doi = {https://doi.org/10.26438/ijcse/v10i12.3440}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i12.3440}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5537
TI - Distributed Operating System Security and Reliability
T2 - International Journal of Computer Sciences and Engineering
AU - Attah Stella, Taylor O.E.
PY - 2022
DA - 2022/12/31
PB - IJCSE, Indore, INDIA
SP - 34-40
IS - 12
VL - 10
SN - 2347-2693
ER -

VIEWS PDF XML
232 306 downloads 133 downloads
  
  
           

Abstract

Major security issues in distributed operating systems are categorized into information leakage via hacking, server redundancy, vulnerability and risk assessment inefficiency. This study presents a systematic survey of security and reliability issues in a distributed operating system. A distributed operating system is a unique system program which adopts numerous central processors for real-time execution of allocated tasks. A distributed operating system connects many computer systems using a single communication channel. The frequent application of distributed operating systems to data sharing and management among cooperate entities has necessitated the need for distributed resources and computing strategies. The security and reliability features of a distributed operating system are critical and highly indispensable. Data security models for reliability of a distributed operating system were analysed, compared and discussed in the study. The essence of the discussed models was to enhance the performance of distributed operating systems. The study looked at models such as data-at-rest security model, access control model, steganography model, body area model, data classification model and cryptography model. The models were adequately compared and analysed especially in terms of performance mode, pros and cons. The study could be beneficial to developers of distributed operating systems and researchers with keen interest in the study area.

Key-Words / Index Term

Data Models, Distributed Operating System, Reliability, Security

References

[1] Andrew, T. and Robbert, R. “Reliability Issues in Distributed Operating Systems”. International Journal of Engineering Technology (IJET), Vol.4, Issue.3, pp.221-229, 2010.
[2] Clarkson, M. and Logan, J. “Modified Survey of Ethical Hacking Concepts”. International Journal of Engineering Technology (IJET), Vol.6, Issue.11, pp.34 – 39, 2005.
[3] Deepika, C., Anjali, L. and Sandeep, Y. “Distributed Operating System: An Overview”. International Journal for Research in Applied Science and Engineering Technology (IJRASET), Vol.2, Issue.4, pp.115 – 119, 2014.
[4] Eman, M., Hatem, A. and Sherif, E. “Data Security Model for Cloud Computing”. Journal of Communication and Computer, 10(2013), pp.1047 – 1062, 2013.
[5] Falk, C. “Ethics and Hacking: The general and Specific”. Norwich University Journal of Information Assurance, 2005.
[6] Farsole, M., Mills, H., and Peter, H. “Introduction to Computer Ethics Awareness”. International Journal of Computer Applications (IJCA), Vol.12, Issue.6, pp.114, 2010.
[7] Kaltrina, N. “Security Issues in Distributed Systems. A Survey”. 1st International Symposium on Computing in Informatics and Mathematics (ISCIM 2011) in collaboration between EPOKA, University and “Aleksander Moisiu” University of Durress on June 2 – 4 2011, Tirana – Durress, Albania, 2011.
[8] Kamal, S. and Anil, K. “Some Issues, Challenges and Problems of Distributed Software System”. International Journal of Computer Science and Information Technologies. Vol.5, Issue.4, pp.4922 – 4925, 2014.
[9] Khan, N. Z. and Yadav, S. R. “Analysis of text classification algorithms: A Review”. International Journal of Trend in Scientific Research and Development, Vol.3, Issue.2, pp.579-581, 2019.
[10] Kriti, K. “Database Security and Access Control Models: A Brief Overview”. International Journal of Engineering, Research and Technology (IJERT), Vol.2, Issue.5, pp.743 – 751, 2013.
[11] Mohit, R. and Manish, L. Research Paper on Distributed Operating Systems. International Journal of Innovative Research in Technology (IJIRT). Vol.1, Issue.5, pp.128 – 132, 2014.
[12] Silvanus, A. “Case Study: Using Security Awareness to combat the advanced persistent threat”. Paper presented at the 13th Colloquium for Information, Systems Security Education (CISSE), University of Alaska, Fairbanks, Seattle, pp.134, 2014.
[13] Warsaw, F., Chris, O., and Smalling, D. “Autonomous Wireless Sensors for Body Area Networks”. IEEE 2017 Custom Integrated Circuits Conference, 2017.
[14] Yang, O. “Proposed Embedded Security framework Internet of things (iot), vehicular Technology”. Information Theory and Aerospace and Electric Systems Technology (wireless vitae), 2011, 2016.
[15] Chen, R., Wong, H., and Ming, I. (2016). Document Classification and Processing Techniques for Software Computing. Available from: International Journal of Engineering Technology (IJET), Vol.12, Issue.3, pp.223 – 227, 2022.
[16] Rani, M. Dick, B., Sara, M., Brad, W., and Tom, L (2018). Analysis and Detection of Malicious Insiders. 2022.
[17] Roiss, M.,and Nazlia, M. (2015). Text classification techniques: A literature review. Interdisciplinary. Available from: Journal of Information, Knowledge, and Management, Vol.13, pp.117-135, 2015.
[18] Adel, S., Fregh, M., and Palls, G. (2016). Data leak: Data Leakage Detection System. Available from: MACRO 2015 – 5th, International Conference on Recent Achievements in Mechatronics, Automation Computer Science and Robotics Vol.6, Issue.4, pp.23 – 29, 2022.
[19] Patel, F. N. and Soni, N. R. (2013). Increasing accuracy of k-nearest neighbour classifier for text classification, International Journal of Computer Science and Informatics, Vol.3, Issue.2, pp.80-85, 2013.