Author : Vikas Reddy. S 1
Date of Publication :7th November 2016
Abstract: In the present scenario distributed system is widely used across the world by different companies to connect their various branches located at different geographical location. Distributed system coordinate the use of physically distributed computer. In distributed system environment it is very important to provide service at any time, any where to the customers, this requires proper time management of all computing and networking resources, resource allocation on time and their proper utilization. In distributed environment security is primary concern. Security is vital for distributed and collaborative applications such as video-conferencing, clustering and replication applications, which operate in dynamic network environment and communicate over secure network . Security vulnerabilities dormant in a distributed system can be intentionally exploited or inadvertently triggered. The threats of exploitation or triggering are only potential, and materialize as an attack or an accident. Vulnerabilities exists in hardware, networks, operating systems, database systems, and applications. New ones are being discovered every day. As the use of distributed system is increasing day by day with the same rate threats of network attacks are also increasing. So better security techniques are required to implement in distributed system environment.
Reference :