EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 4

Accessing the Data Security Model in Distributed System

journal image
 Download
1332
  • Manu Agarwal and Gaurav Agarwal 2012. Accessing the Data Security Model in Distributed System. International Journal of Applied Information Systems. 1, 4 (February 2012), 11-14. DOI=http://dx.doi.org/10.5120/ijais450157
  • @article{10.5120/ijais2017451568,
    author = {Manu Agarwal  and Gaurav Agarwal},
    title = {Accessing the Data Security Model in Distributed System},
    journal = {International Journal of Applied Information Systems},
    issue_date = {February 2012},
    volume = {1},
    number = {},
    month = {February},
    year = {2012},
    issn = {},
    pages = {11-14},
    numpages = {},
    url = {/archives/volume1/number4/80-0157},
    doi = { 10.5120/ijais12-450157},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450157
    %A Manu Agarwal 
    %A Gaurav Agarwal
    %T Accessing the Data Security Model in Distributed System
    %J International Journal of Applied Information Systems
    %@ 
    %V 1
    %N 
    %P 11-14
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

In this paper we discuss suitability of the using an open source environment; OpenCV for providing effective solutions for complex image processing and vision algorithm for real time application for UG and PG students projects. Computer Vision (CV) applications require extensive knowledge of digital signal processing, mathematics, statistics and perception. OpenCV is an open source vision library suitable for such computer vision programs. It’s always benefits to students to learn theoretical aspects of CV concepts by practicing in labs and getting hand-on expertise. In this paper, we describe our experience of using open source library for post-gradates and undergraduate students’ teaching. We also report the experience of developing the projects based on computer vision to Bachelor of Engineering in Information Technology (BE-IT) and Master of Engineering in Information Technology (ME-IT) courses. Initial tutorials designed help students to understand basic concepts of computer vision. Small applications development gives lot of confidence in executing complex assignments and moderate level projects. Statistics shows that projects undertaken by students had increased due to extensive practice on openCV environment. Finally we describe few example project and dissertation submitted in last two years by the students.

References

  1. George Coulouris,Jean Dollimore and Tim Kindberg, Distributed System- Concepts and design, 4th ed. London England: Addison- Wesley 2005.
  2. Andrew S Tnaenbaum and Maarten van Steen, Distributed system: Principal and Paradigms,2nd ed. Upper Saddle River,NJ,USA:Pearson Higher Education, 2007
  3. Mark Baker and Rajkumar Buyva, “Cluster Computing: Architecture and System- Volume 2 Prentice Hall, 1999, ch.1 pp-3-47
  4. Chee Shin Yeo, “Utility-based Resource management for Clusters Computing,” the university of Melbourne,Australia,PhD Thesis 2008.
  5. Rajkumar Buyya and Srikumar Venugopal, “Market Oriented Computing and Global Grids: An Introduction,” in Market Oriented Grid and Utility Computing, Rajkumar Buyya and Kris Bubendorfer, Eds Hoboken,NJ, USA:John Wiley & Sons,Inc,2010,ch 1,pp.3-27
  6. Yuchong Hu, Yimlong Xu,Xiaozhao Wang,Cheng Zhan, and Pei Li, “ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding,” IEEE journal on Selected Areas in Communication,vol. 28,no. 2,pp. 268-276, Feburary 2010
  7. Ali Safari Mamaghani,MostafaMahi,Mohammad Reza Meybodi,and Mohammad Hosseinzadeh Moghaddam, “ A Novel Evolutionary Algorithm for Solving Static Data Allocation Problem in Distributed Database System,” in Second International Confrence on Network Application,Protocols and Services(NETAPPS),Alor Setar, Kedah,2010,pp.14-19
  8. Wei Li and Rayford B Vaughn, “ Cluster Security Reaserch Involving the Modeling of Network Exploitations Using Exploitation Graphs,” in Sixth IEEE International Symposium on Cluster Computing and the Grid Workshop(CCGRIDW’06), Singapore,2006,pp.26-36.
  9. Yuri Demchenko, Cees De Laat, Oscar Koeroo, and David Groep, “ Re-thinking Grid Security Architecture,” in IEEE fourth International Confrence on eScience, 2008(eScience ’08), Indianapolis, IN, USA,2008,pp. 79-86
  10. Ragib Hasan,Suvda Myagmar Adam J Lee, and William Yurcik, “Toward a threat model for storage system,” in Proceedings of 2005 ACM Workshop on Storage Security and Survivalist (StorageSS’05),FairFax,VA,USA,2005,pp.94-102
  11. Zakaria Suliman ZUbi, “ On Distributed Database Security Aspects,” In International Confrence on Multimedia Computing and System, Ouarzazate, Morocco,2009, pp.231-235
  12. White,D (1999), Distributed system security, DBMS, 10, pp. 44-48.
  13. Amoroso, E. (1994), Fundamentals of Computer Security Technology,ch. 7, Prentice-Hall, Englewood Cliffs, NJ.

Keywords

Distributed System, Data Security, Authentication, Authorization

Index Terms

Computer Science
Information Sciences