SECURITY AND PRIVACY METHODS IN DISTRIBUTED SYSTEMS.

Irida Gjermeni, Dudina Hoxha

Abstract


Rapid technological developments and distributed systems have found their most significant expression in the field of communication and dissemination of information. This mass spread of communications through distributed systems such as: internet, intranet, web services, etc., has been influenced by a number of advantages that they present, which have to do with the ease, speed of communication, the ability to communicate in real time between two or more subjects that are located at great distances from each other, etc.

Increasing use of computers, computer systems, and distributed systems has increased the potential risk of damage or misuse of data and computer systems. The dangers that exist are many where some are with minor consequences and some with major consequences, such as: viruses that delete or modify data in systems, gain access to personal computers and use them to attack others, theft of credentials or credit card data, etc. Unfortunately 100% security in a distributed system does not exist despite the measures that can be taken, but taking some security measures minimizes the risk. While in institutions and private companies the protection measures are greater due to the organization, technical structures or investments made for security systems, etc. and thus ensuring a certain level of security, ordinary citizens or users are the ones who are most exposed and must show personal care in their protection. Therefore, they should have basic knowledge about the methods of its preservation.

In this paper, we first study the features and types of distributed systems, security methods through CAPTCHA systems, cryptography, firewalls, etc; DS access channels. As a conclusion, it is intended to build a program in Java, with NetBeans IDE environment that enables the encryption (encoding) of a file with the help of the symmetric encryption algorithm TEA, in this case the encryption of an image, its decryption and display after decryption.

Keyword: encryption algorithm, security, IOT

DOI: 10.7176/CTI/10-07

Publication date:December 31st 2020


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CTI@iiste.org

ISSN (Paper)2224-5774 ISSN (Online)2225-0492

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org