Distributed HPC UFS ACM Optimizing the Risk for All the Time on Every Time

Distributed HPC UFS ACM Optimizing the Risk for All the Time on Every Time

Prashant Kumar Patra (Department of Computer Science and Engineering, Biju Patnaik University of Technology (BPUT), Bhubaneswar, Odisha, India) and Padma Lochan Pradhan (Department of Computer Science and Engineering, Central Institute of Technology, Naya Raipur, Chhattisgarh, India)
DOI: 10.4018/ijapuc.2014070102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The access control mechanism is one of the well advance controls for all the time on every time on recent pervasive computing for protection of data and services from the hacker, thefts and unauthorized users. This paper contributes to the development of an optimization model that aims to determine the optimal cost to be implementing into DOOS security mechanisms on the measure component of UFS attribute. Our objective should be design in such way, that the Read, Write & Execute automatically protect to our web services on DOOS. We have to make high simplification, unification and step by step normalization by implementing UFS ACM mechanism based on distributed object oriented system on N dimensional hypercube model. Finally, we have to maximize the qualities of services & minimize the cost and time of the Business, Resources and Technology. The subject and object can able communicate through read, write and execute over a UFS on N Dimensional HPC. We have to apply these ACM utilities over a anti-fragile technology to make robust and high secure for all the time. Our objective will be resolve the unstable, uncertainty, un-order, un safe and unset up (U^4) problems of complex technology on right time and right place for all the time in around the globe to take care of accountabilities, action abilities and manage abilities. Meanwhile, it will be more accountable for performance, fault tolerance, throughput, bench marking and risk optimization on any web services for all the time.
Article Preview

1. Introduction

Now a day, increasing the complex business, applications, client, users, and resources over a heterogeneous business domain of the multiple location of WAN, LAN, IT Infrastructure, computer & communications system by IT industries has increased the uncertainty, un order, risk of theft to proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory, Kernel & File system). The preventive system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information system security and risk management (Stalling, 2006). The control is inversely proportional to the risk & mean while control is directly proportional to the quality of standard(S) (Pressman, 2001). The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the N dimensional hypercube model for risk mitigation on large scale UNIX operating system based on available technology, business and resources. We have to prevent our data and service from public resources and unauthorized user over a complex operating system (Schneier, 1996; Weber, 2002).

Figure 1.

BRT preventing the data and services

1.1. Real Time Operating System

The most fundamental system program is the operating system, whose job is to control all the resources of the computer and provide a base upon which is the application program can be written. The concept of the operating system as primarily providing its users with a convenient interface is a top-down view. The morden computer system consists of professors, memories, times, firmware, disk, network interfaces, printer and associates with a wide verity of other devices. When a computer or network has a multiple users, the need for managing and protecting the memory, I/O devices and other resources is even greater, since the users might otherwise interface with one another. In addition, users often need to share not only hardware, but information (files, databases, etc) as well. In short, this view of the operating system holds that its primary task is to keep track of who is using which resources, to grant resource requests, to account for usage, and to mediate conflicting requests from different programs and users (Tanenbaum, 2010). The resource management including multiplexing (sharing), time sharing resources in two ways: in time and in space. When resource is time multiplexed, different programs or users take turns using it. First one of them gets to use the resources, then another, and so on. To determining how the resource is time multiplexed – who goes next and for how long- is the task of the RTOS (Tanenbaum, 2010).

The operating system (server system) is a large scale has even greater responsibilities and powers for large scale multiple business for multiple products & clients like web based and mobile computing. It is just like a traffic management system, it makes sure that different tools, application, programs and software packages, the users and clients running at the same time do not interfere with each other (Kai, 2008). The multi programming, time shearing, parallel programming is solving our objective in right time and right way over a multiple Relation, Function, Operation & Services on heterogeneous complex infrastructure. The complex operating system is also responsible for risk and security ensuring that unauthorized users do not access the system (Tanenbaum, 2010). All major computer platforms (hardware, software and application) require and sometimes include an operating system: Main Frame, HP_UX, Sun solaria, AIX, LINUX, WINDOW, NT, WIN2000, VME, OS/400, Z/OS all examples of large scale operating systems (Sun Microsystems, 2002).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing