Abstract

Rapid technological developments and distributed systems have found their most significant expression in the field of communication and dissemination of information. This mass spread of communications through distributed systems such as: internet, intranet, web services, etc., has been influenced by a number of advantages that they present, which have to do with the ease, speed of communication, the ability to communicate in real time between two or more subjects that are located at great distances from each other, etc. Increasing use of computers, computer systems, and distributed systems has increased the potential risk of damage or misuse of data and computer systems. The dangers that exist are many where some are with minor consequences and some with major consequences, such as: viruses that delete or modify data in systems, gain access to personal computers and use them to attack others, theft of credentials or credit card data, etc. Unfortunately 100% security in a distributed system does not exist despite the measures that can be taken, but taking some security measures minimizes the risk. While in institutions and private companies the protection measures are greater due to the organization, technical structures or investments made for security systems, etc. and thus ensuring a certain level of security, ordinary citizens or users are the ones who are most exposed and must show personal care in their protection. Therefore, they should have basic knowledge about the methods of its preservation. In this paper, we first study the features and types of distributed systems, security methods through CAPTCHA systems, cryptography, firewalls, etc; DS access channels. As a conclusion, it is intended to build a program in Java, with NetBeans IDE environment that enables the encryption (encoding) of a file with the help of the symmetric encryption algorithm TEA, in this case the encryption of an image, its decryption and display after decryption. Keyword : encryption algorithm, security, IOT DOI: 10.7176/CTI/10-07 Publication date: December 31 st 2020

Highlights

  • We are all witnesses to the fact that increasingly, human activity is shifting from physical or interpersonal communication to virtual communication in cyberspace

  • Given that computer systems are interconnected, this further facilitates the dissemination of information from one entity to another or to an unspecified number of entities

  • The information stored in this form can be transferred beyond the borders of a country, in large geographical areas in a very short time. All of these advantages make digital information the most widely used form of information storage and exchange. This transformation has long raised a debate: What effect will it have on the secrecy and security of communications?

Read more

Summary

Introduction

We are all witnesses to the fact that increasingly, human activity is shifting from physical or interpersonal communication to virtual communication in cyberspace. In addition to the security of communication of ordinary users of public electronic communications services, "malicious computer attacks" have greatly questioned the security of the information or telematics systems through which these communications are realized, making the dimensions of the intervention of affect an indefinite number of persons. In this way, the right to privacy of individuals can be significantly violated, who, in their daily interaction with the computer infrastructure, throw and transmit in digital form data of a personal nature. According to The Statistical Portal (2021), the global statistics portal on security spending worldwide reports that the cost of security of distributed systems worldwide is about $ 72.5 million

Methods
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call