Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 8Distributed Computing Security: Issues and Challenges

Munmun Saha1, Sanjaya Kumar Panda2 and Suvasini Panigrahi1

1 Department of Computer Science and Engineering, Veer Surendra Sai University of Technology, Burla, India

2 Department of Information Technology, Veer Surendra Sai University of Technology, Burla, India Emails: munmunsas@gmail.com, suvasini26@gmail.com, sanjayauce@gmail.com

Abstract

Distributed computing is a model in which multiple computers interact, coordinate and communicate with each other by sharing and passing messages. The computers can be connected by a wide area network that is geographically distant, or may be connected by a local area network that is physically close. The goal is to make such a network work as a single computer. Security is the most vital requirement of modern distributed computer systems as the system stores critical information, which is accessed and passed along in all types of applications. Therefore, designing a secure system is especially challenging due to the distributed nature of modern systems. Moreover, security in a large distributed information system faces complex challenges, especially where open environment is concerned. In this chapter, we study various security issues and challenges in distributed computing security along with the security issues in advanced areas like heterogeneous computing, cloud computing, fog computing, etc. Moreover, we present the methods/schemes/protocols used in various security issues ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book