Tasks of providing information security in distributed computing networks

2016 ◽  
Vol 50 (8) ◽  
pp. 669-672 ◽  
Author(s):  
A. S. Konoplev ◽  
M. O. Kalinin
Author(s):  
George H. Cheng ◽  
Chao Qi ◽  
G. Gary Wang

A practical, flexible, versatile, and heterogeneous distributed computing framework is presented that simplifies the creation of small-scale local distributed computing networks for the execution of computationally expensive black-box analyses. The framework is called the Dynamic Service-oriented Optimization Computing Framework (DSOCF), and is designed to parallelize black-box computation to speed up optimization runs. It is developed in Java and leverages the Apache River project, which is a dynamic Service-Oriented Architecture (SOA). A roulette-based real-time load balancing algorithm is implemented that supports multiple users and balances against task priorities, which is superior to the rigid pre-set wall clock limits commonly seen in grid computing. The framework accounts for constraints on resources and incorporates a credit-based system to ensure fair usage and access to computing resources. Experimental testing results are shown to demonstrate the effectiveness of the framework.


2019 ◽  
Vol 8 (2) ◽  
pp. 1706-1710

The security parts of distributed computing, particularly the security of information, turn out to be increasingly essential. It is important to build up another component to verify the information in the cloud. Cryptographic based symmetric key cryptosystems helps to provide an efficient way to protect information. Enhanced symmetric key cryptosystem AES algorithm has been proposed for securing the data and safely storing to the cloud. This paper is to provide an overall security to the files which are in the cloud so the encrypted file can be retrieved at any time from the cloud. The paper also aims to introduce the mechanism use to secure cloud computing applications as well as to compare some existing algorithm like RSA and AES with an enhanced AES algorithm and to prove that the proposed algorithm is more effective than the other two algorithms. The encryption speed of the algorithms is graphically represented in the paper.


Information security has reliably been a significant issue in data innovation. In the distributed computing condition, it turns out to be especially genuine in light of the fact that the distributed is suitable in better places even in all the globe. Distributed and security insurance are the two fundamental components of client's worries about the cloud innovation. Despite the fact that numerous procedures on the themes in distributed computing have been researched in the two ventures, information security and security assurance are getting progressively significant for the future improvement of distributed computing innovation in government, industry, and business. Information security and protection assurance issues are significant to both equipment and programming in the cloud design. This examination is to survey diverse security methods and difficulties from both programming and equipment angles for ensuring information in the cloud and targets upgrading the information security and protection assurance for the dependable cloud condition. In this paper, we make a relative research examination of the current research work with respect to the information security and security assurance procedures utilized in the distributed computing.


Author(s):  
Jianan Zhang ◽  
Abhishek Sinha ◽  
Jaime Llorca ◽  
Antonia M. Tulino ◽  
Eytan Modiano

Flowed enlisting gives a course to the business to deal with the figuring assets on the web. The term has made over late years, and can be utilized to outline the utilization of a pariah for your capacity and figuring needs.The mechanical improvement of distributed computing has helped the business to develop as well as the wellbeing of information has turned into a noteworthy issue. Numerous encryption procedures are utilized as a part of information security in cloud. They are especially powerful when the information is away state and in transmission state. Be that as it may, in handling state the information must be unscrambled so that the operations can be performed. Once the information is unscrambled it is accessible to the cloud supplier henceforth these customary encryption systems are insufficient to secure the information. The information will be protected if the operations are performed in the decoded information. This can be accomplished if the information is encoded utilizing homomorphic encryption strategies. This paper examines about the homomorphic encryption method, its disadvantages and future improvements. [19],[20],[21]


With the fame of distributed computing, cell phones can stack/recover individual information from anyplace whenever. Thus, the information security issue in versatile cloud turns out to be increasingly serious and forestalls further advancement of portable cloud. To ensure information security, clients normally encode their touchy information before transferring to cloud servers, which renders the information usage to be troublesome. In any case, there is no solid examinations for getting to cipher texts in mobile cloud. In this paper, we propose a safe and proficient information get to technique for versatile distributed computing. Consolidating proficient Mobile distributed computing system dependent on CP-ABE and presenting characteristic sprout channel for quicker cipher text access in versatile cloud. This plan has straight intricacy and depends for the most part on proficient symmetric key tasks. At long last, security examination and effectiveness correlation show that the proposition is successful for the proficient access of scrambled information in distributed computing.


Sign in / Sign up

Export Citation Format

Share Document