Introducere (3) 1 Punerea problemei 1



Yüklə 263,66 Kb.
səhifə6/6
tarix21.01.2019
ölçüsü263,66 Kb.
#101300
1   2   3   4   5   6

Concluzii

  • Folosind XSN, utilizatorii nu sunt obligaţi să aibă cont la acelaşi furnizor de servicii sociale pentru a comunica între ei.

  • Autentificarea utilizatorilor în reţeaua XSN este sigură, deoarece majoritatea utilizatorilor va folosi servere XMPP cunoscute, precum Google sau Jabber, alternativa fiind să ruleze un server pe calculatorul personal. Asta este un avantaj faţă de Diaspora*, unde, datorită obligativităţii de a folosi un server pe calculatoarele personale, autentificarea este dificilă.

  • Sistemul funcţionează pe dispozitive mobile, pe care rulează sisteme de operare restrictive. Deoarece două aplicaţii nu pot rula în paralel şi aplicaţiile XSN nu trebuie să aibă acces la datele de autentificare ale utilizatorului, sistemul foloseşte algoritmi criptografici cu chei publice pentru a autoriza aceste aplicaţii să acţioneze în numele utilizatorului.

  • Testele efectuate au arătat că stocarea datelor direct pe dispozitivele utilizatorilor nu este fezabilă, datorită puterii mici de procesare, restricţiilor sistemelor de operare şi lărgimii de bandă limitate. În consecinţă e nevoie de stocarea datelor la furnizori specializaţi.

  • Datorită împărţirii sistemului de stocare în două componente, metadate şi date propriu-zise, furnizorul de servicii de stocare nu are acces la datele utilizatorilor, deoarece, pe de o parte, nu stochează metadatele şi, pe de altă parte, datele stocate sunt criptate şi înlocuite periodic.

  • Testele efectuate cu XSN folosind iPod-uri, iPad-uri, sisteme ce rulează Android și calculatoare, cu serverele Google și servere locale, au demonstrat că transmiterea de fișiere mici este fezabilă. Am obținut o viteză de transfer maximă pentru pachete de 128 de KB. Pentru fișierele mari este nevoie de o altă metodă de transfer, deoarece XMPP este optimizat pentru a transmite rapid mesaje scurte. Am folosit pentru aceste fișiere servere HTTP integrate.

La fel ca orice platformă de o asemenea complexitate, sistemul XSN va necesita o lungă perioadă de testare, prin integrarea în diverse aplicaţii.
BIBLIOGRAFIE SELECTIVĂ

[9] Joseph Bonneau and Sören Preibusch. The privacy jungle: on the market for data protection in social networks. In Tyler Moore, David Pym, and Christos Ioannidis, editors, Economics of Information Security and Privacy, pp. 121-167. Springer US, 2010.

[10] D. Boyd. Facebook's privacy trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research into New Media Technologies, 14(1):13-20, 2008.

[11] Jean-Christophe Buisson. Nutri-Educ, a nutrition software application for balancing meals, using fuzzy arithmetic and heuristic search algorithms. Artificial Intelligence in Medicine, 42(3):213-227, 2008.

[13] Mike BURROWS. The chubby lock service for loosely-coupled distributed systems. In Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06, pp. 335–350, Berkeley, CA, USA, 2006. USENIX Association.

[18] Tushar D. CHANDRA, Robert GRIESEMER, and Joshua REDSTONE. Paxos made live: an engineering perspective. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, PODC '07, pp. 398–407, New York, NY, USA, 2007. ACM.

[19] Fay CHANG, Jffrey DEAN, Sanjay GHEMAWAT, Wilson C. HSIEH, Deborah A. WALLACH, Mike BURROWS, Tushar CHANDRA, Andrew FIKES, and Robert E. GRUBER. Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst., 26:4:1–4:26, June 2008.

[22] Jongmyung CHOI, Sangjoon PARK, Hoon KO, Hyun-Joo MOON, and Jongchan LEE. Issues for applying instant messaging to smart home systems. In Osvaldo Gervasi, David Taniar, Beniamino Murgante, Antonio Laganà, Youngsong Mun, and Marina Gavrilova, editors, Computational Science and Its Applications - ICCSA 2009, volume 5592 of Lecture Notes in Computer Science, pp. 649–661. Springer Berlin / Heidelberg, 2009.

[25] Lidija DAVIS. Facebook plans to make money by selling your data, Februarie 2009. http://www.readwriteweb.com/archives/facebook sells your data.php, accesat in Septembrie 2011.

[26] Giuseppe DECANDIA, Deniz HASTORUN, Madan JAMPANI, Gunavardhan KAKULAPATI, Avinash LAKSHMAN, Alex PILCHIN, Swaminathan SIVASUBRAMANIAN, Peter VOSSHALL, and Werner VOGELS. Dynamo: amazon's highly available key-value store. SIGOPS Oper. Syst. Rev., 41:205–220, October 2007.

[35] E. W. FELTEN and M. A. SCHNEIDER. Timing attacks on web privacy. In ACM Conference on Computer and Communications Security, page 25–32. ACM Press, 2000.

[37] Bryan Alexander FORD. UIA: A Global Connectivity Architecture for Mobile Personal Devices. PhD Thesis, Massachusetts Institute of Technology, 2008.

[38] Daniel FORD, Francois LABELLE, Florentina POPOVICI, Murray STOKELY, Van-Anh TRUONG, Luiz BARROSO, Carrie GRIMES, and Sean QUINLAN. Availability in globally distributed storage systems. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010.

[49] Jeremiah GROSSMAN, Robert HANSEN, Seth FOGIE, Petko D. PETKOV, and Anton RAGER. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress Publishing Inc., 2007.

[55] David KARGER, Eric LEHMAN, Tom LEIGHTON, Rina PANIGRAHY, Matthew LEVINE, and Daniel LEWIN. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, STOC '97, pp. 654–663, New York, NY, USA, 1997. ACM.

[56] Vishal KHER and Yongdae KIM. Decentralized authentication mechanisms for object-based storage devices. Second IEEE International Security in Storage Workshop, sisw, p. 1, October 2003.

[57] Ankur KHETRAPAL and Vinay GANESH. Hbase and hypertable for large scale distributed storage systems, a performance evaluation for open source bigtable implementations. Dept. of Computer Science, Purdue University, 2006.

[59] Avinash LAKSHMAN and Prashant MALIK. Cassandra: a decentralized structured storage system. SIGOPS Oper. Syst. Rev., 44:35–40, April 2010.

[60] Leslie LAMPORT. Time clocks, and the ordering of events in a distributed system. Commun. ACM, 21:558–565, July 1978.

[62] Henry LEE and Eugene CHUVYROV. Beginning Windows Phone 7 Development, editia a II-a. Apress, 2011.

[65] Christopher LESNIEWSKI-LAAS and M. Frans KAASHOEK. Ssl splitting: Securely serving data from untrusted caches. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.

[68] Adam LITH and Jakob MATTSON. Investigating storage solutions for large data: A comparison of well performing and scalable data storage solutions for real time extraction and batch insertion of data. Master Thesis, Department of Computer Science and Engineering, Chalmers University of Technology, 2010.

[74] Petros MANIATIS, Mema ROUSSOPOULOS, Ed SWIERK, Kevin LAI, Guido APPENZELLER, Xinhua ZHAO, and Mary BAKER. The mobile people architecture. Mobile Computing and Communications Review, Volume 1, Number 2, 1999.

[75] Steve MANSFIELD-DEVINE. Anti-social networking: exploiting the trusting environment of web 2.0. Network Security, 2008(11):4 – 7, 2008.

[77] Dave MARK and Je_ LaMARCHE. Beginning iPhone 3 Development: Exploring the iPhone SDK. Apress, 2009.

[78] Dave MARK, Je_ LaMARCHE, and Jack NUTTING. More iPhone 4 Development. Further Explorations of the iOS SDK. Apress, 2011.

[86] Mark MURPHY. Beginning Android 2. Apress, 2010.

[87] Mark MURPHY. Beginning Android 3. Apress, 2011.

[89] Arvind Narayanan and Vitaly Shmatikov. De-anonymizing social networks. Security and Privacy, IEEE Symposium on ?, 0:173–187, 2009.

[90] Bogdan NICOLAE. BlobSeer: Towards effcient data storage management for large-scale, distributed systems. These, Université Rennes 1, 2010.

[91] Bogdan NICOLAE, Gabriel ANTONIU, Luc BOUG_E, Diana MOISE, and Alexandra CARPEN-AMARIE. Blobseer: Next-generation data management for large scale infrastructures. Journal of Parallel and Distributed Computing, 71(2):169–184, August 2011.

[92] Vivek PATHAK and Liviu IFTODE. Byzantine fault tolerant public key authentication in peer to peer systems. Computer Networks. Special Issue on Management in Peer to Peer Systems: Trust, Reputation and Security, 50(4):579–596, March 2006.

[93] Tiffany A. PEMPEK, Yevdokiya A. YERMOLAYEVA, and Sandra L. CALVERT. College students' social networking experiences on facebook. Journal of Applied Developmental Psychology, 30(3):227 – 238, 2009.

[94] Charles P. PFLEEGER and Shari Lawrence PFLEEGER. Security in computing, third edition. Prentice Hall, 2003.

[98] Alexandru RADOVICI. Implementarea unui server web pentru platforma Android optimizat pentru oferirea de servicii. Master Thesis, Universitatea "Politehnica" din București, 2010.

[99] Alexandru RADOVICI and Elena Simona APOSTOL. Distributed hybridstorage partially mountable _le system. In Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, pp. 35–40, Stevens Point, Wisconsin, USA, 2009.World Scientific and Engineering Academy and Society (WSEAS).

[100] Alexandru RADOVICI, Jean-Christophe BUISSON, and Valentin CRISTEA. Application platform for a distributed independent social network. The Scientific Bulletin of the University POLITEHNICA of Bucharest (sent to be published).

[101] Alexandru RADOVICI and George DRĂGOI. Web services engine for the android platform. In Proceedings of DAAAM International, pp. 593–594, 2010.

[102] Alexandru RADOVICI, Tudor MIU, and George DRĂGOI. Distributed multimedia file system. In Proceedings of DAAAM International, pp. 593–594, 2009.

[107] Peter SAINT-ANDRE, Kevin SMITH, and Remko TRONCON. XMPP: The Definitve Guide. O'REILLY, 2009.

[109] Sectechno. Beware of a new xss on facebook, Martie 2011. http://www.sectechno.com/ 2011/03/29/beware-of-a-new-xss-on-facebook/, accesat in Septembrie 2011.

[110] Asaf SHABTAI, Yuval FLEDEL, Uri KANONOV, Yuval ELOVICI, and Shlomi DOLEV. Google android: A state-of-the-art review of security mechanisms. CoRR, abs/0912.5101, 2009.

[116] Daniel H. STEINBERG and Stuart CHESHIRE. Zero Configuration Networking: The Definitive Guide. O'Reilly Media, 2005.

[117] Jacob STRAUSS, Justin Mazzola PALUSKA, Chris LESNIEWSKI-LAAS, Bryan FORD, Robert MORRIS, and Frans KAASHOEK. Eyo: devicetransparent personal storage. In Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIXATC'11, pp. 35–35, Berkeley, CA, USA, 2011. USENIX Association.

[125] Naushad UZZAMAN. Survey on google file system. University of Rochester, 2007.

[126] Sander VUGT. Configuring openldap. In Pro Ubuntu Server Administration, pp. 197–230. Apress, 2009.

[127] Johannes WAGENER, Ola SPJUTH, Egon WILLIGHAGEN, and Jarl WIKBERG. Xmpp for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services. BMC Bioinformatics, 10:1–12, 2009. 10.1186/1471-2105-10-279.

[129] Wenmao ZHANG, Jun BI, Miao ZHANG, and Zheng QIN. A trustworthy email system based on instant messaging. In Witold Abramowicz, editor, Business Information Systems, volume 4439 of Lecture Notes in Computer Science, pages 598–609. Springer Berlin / Heidelberg, 2007.



Lista de lucrări

1. Alexandru RADOVICI, Jean-Christophe BUISSON, and Valentin CRISTEA. Application platform for a distributed independent social network. The Scientific Bulletin of the University POLITEHNICA of Bucharest (sent to be published).

2. Alexandru RADOVICI and George DRĂGOI. Web services engine for the android platform. In Proceedings of DAAAM International, pp. 593–594, 2010.

3. Alexandru RADOVICI, Tudor MIU, and George DRĂGOI. Distributed multimedia file system. In Proceedings of DAAAM International, pp. 593–594, 2009.

4. Alexandru RADOVICI and Elena Simona Apostol. Distributed hybrid-storage partially mountable file system. In Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, World Scientific and Engineering Academy and Society (WSEAS). pp. 35–40, Stevens Point, Wisconsin, USA, 2009.

5. George DRAGOI, Anca DRAGHICI, Sebastian Marius ROSU, Alexandru RADOVICI, and Costel Emil COTET. Professional risk assessment using virtual enterprise network support for knowledge bases development. In Joao Eduardo Quintela Varajao, Maria Manuela Cruz-Cunha, Goran D. Putnik, and Antonio Trigo, editors, ENTERprise Information Systems, volume 110 of Communications in Computer and Information Science, pp. 168–177. Springer Berlin Heidelberg, 2010.

6. George DRAGOI, Luminita ROSU, Sebastian Marius ROSU, Alexandru RADOVICI, and Costel Emil COTET. Internet intranet extranet based system in the preminv platform for virtual product development environment. In The 5th Balkan Region Conference on Engineering Education & 2nd International Conference on Engineering and Business Education, Sibiu, Romania, 15 - 17 October, 2009, Volume I, ISBN978-973-739-848-2, ISSN 1843-6730, pp. 95–100, 2009.

7. Tudor MIU, Olivia STANESCU, Ana CONSTANTIN, Sorin LACRITEANU, Roxana GRIGORE, Domnina BURCA, Tudor CONSTANTINESCU, and Alexandru RADOVICI. Media center oriented linux operating system. In Proceedings of the 9th Workshop on Multimedia Metadata, March, 2009, ISBN: 978-2-917490-07-5, ISSN: 1613-0073, 2009.





Yüklə 263,66 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin