Reference Hub10
Network Security Approaches in Distributed Environment

Network Security Approaches in Distributed Environment

Keshav Sinha, Partha Paul, Amritanjali
Copyright: © 2019 |Pages: 36
ISBN13: 9781522579557|ISBN10: 1522579559|ISBN13 Softcover: 9781522591481|EISBN13: 9781522579564
DOI: 10.4018/978-1-5225-7955-7.ch008
Cite Chapter Cite Chapter

MLA

Sinha, Keshav, et al. "Network Security Approaches in Distributed Environment." Computational Intelligence in the Internet of Things, edited by Hindriyanto Dwi Purnomo, IGI Global, 2019, pp. 174-209. https://doi.org/10.4018/978-1-5225-7955-7.ch008

APA

Sinha, K., Paul, P., & Amritanjali. (2019). Network Security Approaches in Distributed Environment. In H. Purnomo (Ed.), Computational Intelligence in the Internet of Things (pp. 174-209). IGI Global. https://doi.org/10.4018/978-1-5225-7955-7.ch008

Chicago

Sinha, Keshav, Partha Paul, and Amritanjali. "Network Security Approaches in Distributed Environment." In Computational Intelligence in the Internet of Things, edited by Hindriyanto Dwi Purnomo, 174-209. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7955-7.ch008

Export Reference

Mendeley
Favorite

Abstract

Distributed computing is one of the thrust areas in the field of computer science, but when we are concerned about security a question arises, “Can it be secure?” From this note, the authors start this chapter. In the distributed environment, when the system is connected to a network, and the operating system firewall is active, it will take care of all the authentication and access control requests. There are several traditional cryptographic approaches which implement authentication and access control. The encryption algorithms such as Rijndael, RSA, A3, and A5 is used for providing data secrecy. Some of the key distribution techniques have been discussed such as Diffie Hellman key exchange for symmetric key, and random key generation (LCG) technique is used in red-black tree traversal which provides the security of the digital contents. The chapter deals with the advanced versions of the network security techniques and cryptographic algorithms for the security of multimedia contents over the internet.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.