5Approaches and Methodologies for Distributed Systems: Threats, Challenges, and Future Directions

Bhawna and Veena Parihar

KIET Group of Institutions, Ghaziabad, Uttar Pradesh, India

5.1 Introduction

In the era of digital transformation, distributed systems (DSs) have become an essential part of our daily lives. They offer the ability to connect and share data, resources, and computational power across multiple devices and locations, providing a flexible and scalable solution for various applications such as cloud computing, big data processing, and the Internet of Things (IoTs). However, the increased connectivity of these systems also brings new security challenges that must be addressed. The security of DSs is threatened by a wide range of attacks [1], including hacking, malware, and denial of service (DoS) attacks. These threats can result in unauthorized access to sensitive information, data theft, and disruption of normal system operations. In addition, the use of wireless communication and the integration of DSs into existing networks introduce new security challenges that must be addressed, such as the risk of eavesdropping and man-in-the-middle (MitM) attacks.

To mitigate these security threats, various access control methods have been proposed and implemented in DSs. These methods, such as role-based access control (RBAC), discretionary access control (DAC), and mandatory access control (MAC), aim to restrict access to sensitive information and resources to authorized ...

Get Meta-Heuristic Algorithms for Advanced Distributed Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.