Skip to main content

Privacy, Security, and Protection in Distributed Computing Systems

  • Conference paper
  • 39 Accesses

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 92))

Abstract

The innovations in semiconductor technology in the past decade have brought down the computing hardware cost to such a low level that the system planners of today are more inclined to have distributed systems installed wherever possible and interconnect them through communication networks. The distributed systems basically are candidates for giving increased performance, extensibility, increased availability, and resource sharing. The necessities like multiuser configuration, resource sharing, and some form of communication between the workstations have created a new set of problems with respect to privacy, security, and protection of the system as well as the user and data. This is equally true with automated office systems, which are formed by interconnecting the workstations of various departments, as the access to different sets of classified information may be restricted to different levels of management personnel. Computer privacy is concerned with the type of information collected, the person authorised to collect, the type of access and dissemination, the subject rights, the penalties, and licencing matters. Thus privacy affects all aspects of computer security. The first level of implementation of these privacy issues, the external protection environment, consists of administrative control and physical security. The next level, the internal protection mechanisms, consists of authentication, access control, surveillance, and communications security. Implementation of the internal protection are done at three levels. The first, at the hardware level, is accomplished by means of memory protection, multiple execution states, and/or special front end processors. The second level is implemented through software by means of surveillance mechanism comprising logging, access control, information flow control, and/or threat monitoring or by isolation. The last level is the data security both in database and data transmission. Cryptographic techniques are used for data security. This paper surveys the advances made in different areas of the internal level implementation of the security policies in a computing system with special reference to a distributed computing system with internode communication. Current research is to choose the appropriate internal protection mechanism for a fault tolerant distributed computer system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abramson, D., Hardware for Capability Based Addressing Proc. 9 th Australian Computer Conference, Hobart, (1982), 101–115.

    Google Scholar 

  2. Bell, D.E. and La Padula. L. J., Secure Computer Systems: Mathematical Foundations and Models M74–244, The Mitre Corp., Bedford, Mass (1973)

    Google Scholar 

  3. Buckingham, B.R.S., CL/SWARD Command Language SRI-CSL-79–013c, IBM Systems Research Institute, New York (1980).

    Google Scholar 

  4. Campbell, C.M., Design and Specification of Cryptographic Capabilities Proc. Conf. on Computer Security and the Data Encryption Standard, National Bureau of Standards, Gaithersburg, MD., (1977).

    Google Scholar 

  5. Cosserat, D.C., A Data Model Based on the Capability Protection Mechanism Proc. International Workshop on Protection in Operating Systems, Rocquen-court, France, (1974), 35–54.

    Google Scholar 

  6. Davida, G.I., Wells, D.L., and Kam, J.B., A Database Encryption System With Sub-keys ACM Transactions on Database Systems, 2 (1981), 312–328.

    Article  MathSciNet  Google Scholar 

  7. Denning, D.E., Secure Information Flow in Computer Systems Ph.D. Thesis, Purdue University, W.Lafayette, Indiana, (1975).

    Google Scholar 

  8. Denning, D.E., A Lattice Model for Secure Information Flow Comm. ACM, 19 (1976) 236–243.

    Article  MathSciNet  MATH  Google Scholar 

  9. Denning, D.E., Cryptography and Data Security Addison-Wesley Publishing Company, Reading, Mass., (1982).

    MATH  Google Scholar 

  10. Denning, P.J., Fault Tolerant Operating Systems ACM Computing Surveys 8 (December 1976).

    Google Scholar 

  11. Dennis, J.B., and Von Horn, E.C., Programming Semantics for Multiprogrammed Computations Comm. ACM, 9 (March 1966), 143–155.

    Article  MATH  Google Scholar 

  12. Donnelley, J.E., and Fletcher, J.G., Resource Access Control in a Network Operating System Proc. ACM Pacific 80 Conference, San Francisco., California, (Nov. 1980)

    Google Scholar 

  13. England, D.M., Capability Concept Mechanism and Structure in System 250 Proc. International Workshop on Protection in Operating Systems, Rocquen-court, France, (August 1974).

    Google Scholar 

  14. Fabry, R.S., Capability Based Addressing Comm. ACM, 17 (July 1974), 403–412.

    Article  Google Scholar 

  15. Fenton, J.S., Information Protection Systems Ph.D. Thesis, Univ. of Cambridge, Cambridge, England (1973).

    Google Scholar 

  16. Gat, I., and Saal, H.J., Memoryless Execution: A Programmer’s Viewpoint IBM Tech. Report 025, IBM Israeli Science Center, Haifa, Israel (March 1975).

    Google Scholar 

  17. Gligor, V.D., Review and Revocation of Access Privileges Distributed Through Capabilities IEEE Trans, on Software Engineering SE-5 (November 1979).

    Google Scholar 

  18. Graham, G.S., and Denning, P.J., Protection-Principles and practice Proc. Spring Jt. Computer conf. Vol. 40, AFIPS Press, Montvale, N.J. (1972)

    Google Scholar 

  19. Harrison, M.A., and Ruzzo, W.L., Monotonic Protection Systems in Foundations of Secure Computation, ed. R.A. DeMillo et al., Academic Press, New York (1978).

    Google Scholar 

  20. Hsiao, D.K., Kerr, D.S., and Madnick, S.E., Computer Security Academic Press, New york (1979).

    Google Scholar 

  21. Jones, A.K., Protection Mechanisms and the Enforcement of Security Policies in Operating Systems — An Advanced Course, Lecture Notes in Computer Science Vol. 60, Springer-Verlag (1978).

    Google Scholar 

  22. Keedy, J.L., A Memory Architecture for Object-Oriented Systems Proc. Objec-torientierte Software- und Hardware- architekturen, H. Stoyan, und H. Wedekind (ed.), Geran Chapter of the ACM (May 1983), 238–250.

    Google Scholar 

  23. Kent, S., Encryption Based Protection for Interactive User/Computer Communication Proc. 5 th Data Commun. Symp., Snowbird, UT, (Sept. 1977), 5–13.

    Google Scholar 

  24. Lampson, B.W., Protection Proc. 5 th Princeton Symp. of Info. Sci. and Syst., Princeton Univ. (March 1971).

    Google Scholar 

  25. Lampson, B.W., A Note on Error Confinement Comm. ACM 16 (Oct. 1973)

    Google Scholar 

  26. Lampson, B.W., Horning, J.J., London, R.L., Mitchel, J.G., and Popek, G.J., Report on the Programming Language EUCLID (Aug 1976).

    Google Scholar 

  27. Lampson, B. W., and Sturgis, H. E., Reflections on an Operating System Design Comm. ACM, 19 (May 1976), 251–265.

    Google Scholar 

  28. Lampson, B.W., Paul, M., and Siegert, H.J., (Editors), Distributed Systems- Architecture and ImplementationAn Advanced Course, Lecture Notes in Computer Science, Vol. 105, Springer-Verlag (1981).

    Google Scholar 

  29. Myers, G.J., Advances in Computer Architecture John Wiley and Sons (1982).

    MATH  Google Scholar 

  30. Needham, R.M., Protection in Computing Systems Reliability, ed. T. Anderson, and B. Randell Cambridge University Press, Cambridge (1979).

    Google Scholar 

  31. Nessett, D. M., A Systematic Methodology for Analyzing Security Threats to Interprocess Communication in a Distributed System IEEE Trans. Communication Vol. COM-31, No.9, (Sept. 1983).

    Google Scholar 

  32. Neumann, P.G., Boyer, R.S., Feiertag, R.S., Levitt, K.N., and Robinson, L., A Prov-ably Secure Operating System:The System, Its Applications, and Proofs Computer Science Lab. Report CSL-116, SRI International, Menlo Park, Calif. (May 1980)

    Google Scholar 

  33. Rushby, J., and Randell, B., A Distributed Secure System Computer (July 1983), 55–67.

    Google Scholar 

  34. Saltzer, J.H., and Schroeder, M.D., The Protection of Information in Computer Systems Proc. IEEE 63 (Sept. 1975), 1278–1308.

    Article  Google Scholar 

  35. Schroeder, M.D., and Saltzer, J.H., A Hardware Architecture for Implementing Protection Rings Comm. ACM 15 (March 1972), 157–170.

    Article  Google Scholar 

  36. Smith, S.A., and Benjamin, R.I., Projecting Demand for Electronic Communications in Automated Offices ACM Trans Office Information Systems 1 (July 1983), 211–229.

    Article  Google Scholar 

  37. Wilkes, M.V., and Needham, R.M., The Cambridge CAP Computer and its Operating System North Holland (1979)

    Google Scholar 

  38. Wulf, W.A., Cohen, E., Corwin, W., Jones, A.K., Levin, R., Pierson, C., and Pollack, F., HYDRA: The Kernel of a Multiprocessing System Comm. ACM 17 (June 1974), 337–345.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1985 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pedar, A. (1985). Privacy, Security, and Protection in Distributed Computing Systems. In: Krückeberg, F., Schindler, S., Spaniol, O. (eds) Offene Multifunktionale Büroarbeitsplätze und Bildschirmtext. Informatik-Fachberichte, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-09043-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-09043-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-15186-9

  • Online ISBN: 978-3-662-09043-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics