Skip to main content

Abstract

The goal of this chapter is to give a broad overview on recent developments in securing distributed systems. Special emphasis is put on multilateral security which equally includes the mechanical protection of systems and the guided privacy preservation for users. In the cloud age, characterised by ubiquitous connectivity but also by almost sneaky data collection and activity pattern collection, such a broad view on security is warranted to not put anybody who eventually uses such complex systems at risk more than necessary. Despite extreme caution, there will never be an absolute security, and operational or interaction mistakes may still put users at risk.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. BDSG – Bundesdatenschutzgesetz. German Federal Law; online: http://www.gesetze-im-internet.de/bdsg_1990/index.html, 1990/2009.

  2. SET Secure Electronic Transaction. Mastercard and VISA, 1997.

    Google Scholar 

  3. SigG – Gesetz über Rahmenbedingungen für elektronische Signaturen. German Federal Law; online: http://www.gesetze-im-internet.de/sigg_2001/index.html, 2001.

  4. Wireless Application Protocol Architecture Specification. online: http://www.wapforum.org/what/technical.htm, 2002.

  5. Firewall classification: excITingIP. online: http://www.excitingip.com, 2015.

  6. Steganos – Privacy software made easy. online: https://www.steganos.com/en/, 2016.

  7. U. Black. Internet Security Protocols – Protecting IP Traffic. Prentice Hall, 2001. 304 p.

    Google Scholar 

  8. S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492, May 2006.

    Google Scholar 

  9. Gilles Brassard. Cryptography in a Quantum World. In SOFSEM, p. 3–16, 2016.

    Google Scholar 

  10. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM, 24(2):84–90, February 1981.

    Article  Google Scholar 

  11. C. Michael Chernick, Charles Edington III, Matthew J. Fanto, and Rob Rosenthal. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations. NIST Special Publication 800-52, 2005.

    Google Scholar 

  12. George Danezis. MIX Networks with Restricted Routes. In Privacy Enhancing Technologies: Third International Workshop (PET), March 2003.

    Google Scholar 

  13. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008.

    Google Scholar 

  14. Carol Fung and Raouf Boutaba. Intrusion Detection Networks: A Key to Collaborative Security, 2013. 261 pages.

    Google Scholar 

  15. Christina Garman, Kenneth G. Paterson, and Thyla Van der Merwe. Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. In USENIX Security 2015, p. 113–128, 2015.

    Google Scholar 

  16. Adam Hils, Greg Young, and Jeremy D’Hoinne. Magic Quadrant for Enterprise Network Firewalls. Gartner, April 2015.

    Google Scholar 

  17. Bert-Jaap Koops. Crypto Law Survey. online: http://www.cryptolaw.org/, 2008/2013.

  18. Gunter Saake Muhammad Saqib Niaz. Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data. In GvD, p. 66–71, 2015.

    Google Scholar 

  19. Maryline Laurent Nesrine Kaaniche, Ethmane El Moustaine. A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications. In CCGRID, p. 522–531, 2014.

    Google Scholar 

  20. M. Pierson. Computer- und Multimediarecht. Hanser-Verlag / Taschenbuch der Informatik, 2007. esp. pp. 510–524.

    Google Scholar 

  21. M. I. P. Salas and Eliane Martins. Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security. Electr. Notes Theor. Comput. Sci. (ENTCS), 302:133–154, February 2014.

    Google Scholar 

  22. Alexander Schill and Thomas Springer. Verteilte Systeme – Grundlagen und Basistechnologien. Springer-Verlag, second edition, 2012. 433 p.; in German.

    Google Scholar 

  23. Bruce Schneier. SHA-1 Freestart Collision. online: https://www.schneier.com/blog/archives/2015/10/sha-1_freestart.html, 2015.

  24. Martin L. Shooman. Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, 1st edition, 2002.

    Google Scholar 

  25. W. Stallings. Network Security Essentials. Prentice Hall, 2002. 366 p.

    Google Scholar 

  26. Jan van Eyck. The Arnolfini Wedding. The Portrait of Giovanni Arnolfini and his Wife Giovanna Cenami (The Arnolfini Marriage). http://www.wikiart.org/en/jan-van-eyck/the-arnolfini-wedding-the-portrait-of-giovanni-arnolfini-and-his-wife-giovanna-cenami-the-1434, 1434.

  27. Andreas Westfeld. Principles of secured steganography. Doctoral dissertation, 2000.

    Google Scholar 

  28. Greg Young. Hype Cycle for Infrastructure Protection. Gartner, August 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andriy Luntovskyy .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Luntovskyy, A., Spillner, J. (2017). Security in Distributed Systems. In: Architectural Transformations in Network Services and Distributed Systems. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-14842-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-14842-3_7

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-14840-9

  • Online ISBN: 978-3-658-14842-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics