Quarterly Journal of Information and Communication Technology ​

Security Aspects in the Kernel of Distributed Operating Systems

Author

Electrical and Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran, Iran

10.22034/apj.2023.705651
Abstract
Nowadays, due to the large amount of information and the need of rapid processing, the need for computers with up-to-date and efficient operating systems with high processing power is felt. During the last decades, progress in the field of information technology has made available fast distribution systems. Distributed systems are one of the best solutions to achieve the above goal. By placing computer systems on the platform of the distribution network, it is possible to create a high processing power, whose complexity and organization are hidden from the eyes of users and in addition, it brings us the availability of resources and scalability. Securing the core of distributed operating systems is a necessity that can help improve the security of information technology in distributed network environments. In order to fundamentally implement this process, it is necessary to create an expert security team. Also, in addition to the technical review and the implementation of protection settings and access controls, there is a need to develop new methods and tools to study the sequence of certain or possible protection operations in the core of distributed operating systems. In this article, we are going to examine the security aspects in the core of distributed operating systems.

Keywords


     [1]          Na SH, Park JY, Huh EN. Personal cloud computing security framework. In2010 IEEE Asia-Pacific Services Computing Conference 2010 Dec 6 (pp. 671-675). IEEE.
     [2]          Abdelmoumin G, Hazzazi N. Distributed Operating System Security and Protection: A Short Survey. In17th International Conference on Information Technology–New Generations (ITNG 2020) 2020 (pp. 145-151). Springer International Publishing.
     [3]          Wang M, Goscinski A. The development and testing of the identity-based conference key distribution system for the RHODOS distributed system. InComputer Security—ESORICS 92: Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings 2 1992 (pp. 209-228). Springer Berlin Heidelberg.
     [4]          Priyadarshini SB, Bagjadab AB, Mishra BK. Security in distributed operating system: A comprehensive study. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies. 2019 Mar 25:221-30.
     [5]          Dhamdhere D. Operating systems. McGraw-Hill, Inc.; 2008 Jan 9.
     [6]          Schwarzkopf M, Grosvenor MP, Hand S. New wine in old skins: the case for distributed operating systems in the data center. InProceedings of the 4th Asia-Pacific Workshop on Systems 2013 Jul 29 (pp. 1-7).
     [7]          Vinter ST, Casey TA, Huber KA. The Secure Distributed Operating System Design Project. BBN LABS INC CAMBRIDGE MA; 1988 Jun 1.
     [8]          Zhang C, Shaw R, Heckman MR, Benson GD, Archer M, Levitt K, Olsson RA. Towards a Formal Verification of a Secure and Distributed System and Its Applications. CALIFORNIA UNIV DAVIS DEPT OF COMPUTER SCIENCE; 1994 Jan 1.
     [9]          Caelli WJ. Security in open and distributed systems. Information Management & Computer Security. 1994 Mar 1;2(1):18-24.
  [10]          Tanenbaum AS, Van Renesse R. Distributed operating systems. ACM Computing Surveys (CSUR). 1985 Dec 10;17(4):419-70.
  [11]          Arenas AE, Aziz B, Maj S, Matthews B. An autonomic security monitor for distributed operating systems. InTowards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings 4 2011 (pp. 112-121). Springer Berlin Heidelberg.
  [12]          Nessett DM. Identifier protection in a distributed operating system. ACM SIGOPS Operating Systems Review. 1982 Jan 1;16(1):26-31.
  [13]          Xiao Y, Pan Y, editors. Security in distributed and networking systems. World Scientific; 2007.
  [14]          Mullender SJ, Van Rossum G, Tananbaum AS, Van Renesse R, Van Staveren H. Amoeba: A distributed operating system for the 1990s. Computer. 1990 May;23(5):44-53.
  [15]          Chapin PC. Distributed Operating Systems.
  [16]          Khan S, Waqas SM, Ahmed A. A Survey of Security Threats in Distributed Operating System. i-Manager's Journal on Computer Science. 2020 Sep 1;8(3):44.
  [17]          Sinha PK. Distributed operating systems: concepts and design. PHI Learning Pvt. Ltd.; 1998.