Abstract
In this paper, we investigate several modern distributed operating systems (DiOSs) and their security policies and mechanisms. We survey the various security and protection issues present in DiOSs and review strategies and techniques used by DiOSs to control access to system resources and protect the integrity of the information stored in the system from accidental events and malicious activities. Further, we distinguish between network security and DiOSs security and explore the attack surface of DiOSs compared to traditional operating systems. We concentrate on a class of distributed operating systems known as cloud operating systems (COSs).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kshemkalyani, A., Singhal, M.: Distributed Systems Principles, Algorithms, and Systems. Cambridge University Press, New York (2008)
Steen, M.V., Tanenbaum, A.S.: A brief introduction to distributed system. Computing. 98, 967–1009 (2016)
Silberschatz, A., Galvin, P.B., Gagne, G.: Operating System Concepts, 8th edn. Wiley, Hoboken (2009)
The Univerity of Edinburgh: https://www.inf.ed.ac.uk/teaching/courses/ds/slides1516/OS.pdf
Healy, P., Lynn, T., Barrett, E., Morrison, J.P.: Single System Image. J. Parallel Distrib. Comput. 90–91, 35–51 (2016)
Puder, A., Römer, K., Pilhofer, F.: Distributed Systems Architecture: A Middleware Approach. Morgan Kaufmann, Burlington (2006)
Khapre, S., Jean, J., Amudhavel, J., Chandramohan, D., Sujatha, P., Narasimhulu, V.: Survey on distributed operating systems: a real time approach. Int. J. Comput. Sci. Emerg. Technol. 1(2), 109–123 (2010)
Steen, M.V., Tanenbaum, A.S.: Distributed Systems, 3rd ed. Maarten van Steen. Distibuted-systems.net (2017)
DISTRIBUTED-SYTEMS.NETS: Maarten Van Steen. https://www.distributed-systems.net/
Coulouris, G.F., Dollimore, J., Kindberg, T., Blair, G.: Distributed Systems: Concepts and Design. Addison-Wesley, New York (2012)
Wichita State University: http://www.cs.wichita.edu/~chang/lecture/cs843/homework/dist-os.html
Pathan, A.S.K., Pathan, M., Lee, H.Y.: Advancements in Distributed Computing and Internet Technologies. Trends and Issues. IGI Global, Hershey (2012)
Kumar, O., Goel, V., Rai, D.: Cloud as an evolutionary operating system. IJCA J. ICNICT. 6, 11–14 (2012)
Chiueh, T., Chang, E.J., Huang, R., Lee, H., Sung, V., Chiang, M.H.: Security considerations in ITRI cloud OS. In: International Carnahan Conference on Security Technology (ICCST), pp. 107–112. IEEE, New York (2015)
Marinescu, D.: Cloud Computing Theory and Practice. Morgan Kaufmann, Waltham (2013)
Bardhan, N., Singh, P.: Operating system used in cloud computing. Int. J. Comput. Sci. Inform. Technol. 6(1), 542–544 (2015)
Chandra, D.G., Malaya, D.B.: A study on cloud OS. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 692–697. IEEE, New York (2012)
Pianese, F., Bosch, P., Duminuco, A., Janssens, N., Stathopoulos, T., Steiner, M.: Toward a cloud operating system. In: IEEE/IFIPNetwork Operations and Management Symposium Workshops, pp. 335–342. IEEE, New York (2010)
Casey, T.A., Vinter, S.T., Weber, D.G., Varadarajan, R., Rosenthal, D.: A secure distributed operating system. In: IEEE Symposium on Security and Privacy, pp. 27–38. IEEE, New York (1988)
Bhargava, B., Lilien, L.: Vulnerabilities and threats in distributed systems. In: 1st International Conference on Distributed Computing and Internet Technology, ser. ICDCIT, pp. 146–157. Springer-Verlag, New York (2004)
Singh, A., Shrivastava, D.M.: Overview of attacks on cloud computing. Int. J. Eng. Innov. Technol. 1(4), 321–323 (2012)
Sgandurra, D., Lupu, E.: Evolution of attacks, threat models, and solutions for virtualized systems. J. CSUR. 48(3), 1–38 (2016)
Pék, G., Buttyán, L., Bencsáth, B.: A survey of security issues in hardware virtualization. J. CSUR. 45(3), 1–34 (2013)
Uday Kumar, N.L., Siddappa, M.: Ensuring security for virtualization in cloud services. In: International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), pp. 248–251. IEEE, New York (2016)
Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: 18th ACM Conference on Computer and Communications Security (CCS), pp. 401–412, New York. ACM (2011)
Gruschka, N., Jensen, M.: Attack surfaces: a taxonomy for attacks on cloud services. In: 3rd International Conference on Cloud Computing, pp. 276–279. IEEE, New York (2010)
Gkortzis, A., Rizou, S., Spinellis, D.: An empirical analysis of vulnerabilities in virtualization technologies. In: IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 533–538. IEEE, New York (2016)
Common vulnerabilities and exposure. https://cve.mitre.org/
VMware and SAVVIS: https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/whitepaper/cloud/vmware-savvis-cloud-white-paper-en.pdf
Goole Cloud: https://cloud.google.com/container-optimized-os/docs/concepts/security
Microsoft Azure: https://docs.microsoft.com/en-us/azure/security-center/tutorial-protect-resources
Center for Internet Security: https://www.cisecurity.org/cis-hardened-image-list/
Pettersen, R., Johansen, H.D., Johansen, D.: Secure edge computing with ARM TrustZone. In: 2nd International Conference on Internet of Things, Big Data and Security, pp. 102–109. SCITEPRESS-Science and Technology Publications, Setúbal (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Abdelmoumin, G., Hazzazi, N. (2020). Distributed Operating System Security and Protection: A Short Survey. In: Latifi, S. (eds) 17th International Conference on Information Technology–New Generations (ITNG 2020). Advances in Intelligent Systems and Computing, vol 1134. Springer, Cham. https://doi.org/10.1007/978-3-030-43020-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-43020-7_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43019-1
Online ISBN: 978-3-030-43020-7
eBook Packages: EngineeringEngineering (R0)