An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System

An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System

Prashanta Kumar Patra (Department of CSE, College of Engineering and Technology, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India) and Padma Lochan Pradhan (Department of CSE, Central Institute of Technology, Raipur, India)
Copyright: © 2014 |Pages: 24
DOI: 10.4018/ijisp.2014010103


This article provide maximum preventive control, high performance and fault tolerance at an optimal resources, cost, time with high availability and quality of services to be invested into dynamic security mechanisms deciding on the measure component of real time operating system resources (Shell, File, Memory, Processor, Kernel, Encryption key, I/O devices). The authors have to define, design, develop and deploy our valuable idea to be optimizing the technology, resource, cost and maximize the throughput, productivity of business all together at anytime and anywhere in around the globe by applying this integrated dynamic model. This dynamic model interfacing, integrating, communicating, synchroning, preventing and optimize step by step through real time algebraic method over a RTOS on distributed super scalar environment (MIMD). This proposed dynamic algebraic model would be preventing the data and services on RTOS from uncertainty, unorder, unsetup, unsafe and external hackers. Mean while this model would be identifying vulnerabilities and threats on operating system resources to achieving the highest business objectives by utilizing the efficient and reliable resources management. The authors have to optimized the system attacks and down time by verification and validation of this method on complex heterogonous infrastructure.
Article Preview

1. Introduction

The increased use of clients, business and computer and communications system by complex IT industries has increased the risk of theft of proprietary information (Coriolis, 2002; Stalling, 2006). The operating system control and audit is a primary method of protecting system resources (Processor, Memory, File and Encryption Key) (see Figure 1). The system control is probably the most important aspect of communications security and becoming increasingly the important as basic building block for computer security and risk management. The control is inversely proportional to the risk and mean while control is directly proportional to the quality of standard.

Figure 1.

Technology, business and resources

1.1. Operating System

The operating system is large scale has even greater responsibilities and powers for large scale business like web and mobile computing (Das, 2009; Kai, 2008; O’ Reilly, 1995; Sun-Microsystems, 2002). It is just like a traffic management system, it makes sure that different programs and software packages the users and clients running at the same time do not interfere with each other. The operating system is also responsible for risk and security ensuring that unauthorized users do not access into the system.

The operating system of a computer (central server) being highly secure depends on a number of technologies (tools and utilities) that working efficient and reliable manner in around the clock. The modern real time operating system provides access to a number of resources and sub-system, which are available to system software running on the system and to external devices like communication networks (LAN/WAN). The operating system is the most important and high available system software (program) that run on the heart of the computer (kernel). The every general-purpose computer must have an operating system to run other multiple application programs at the same time with multi location, function, operation and services without any fault. The hierarchical architecture of the RTOS is shown in Figure 2 (Das, 2009; Sun-Microsystems, 2002).

Figure 2.

Architecture of the RTOS

Complete Article List

Search this Journal:
Open Access Articles
Volume 13: 4 Issues (2019): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing