Início
Conheça mais
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Anúncio
Ijetcas14 583
Denunciar
Iasir Journals
Seguir
Editor
11 de Sep de 2014
•
0 gostou
1 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
186 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Próximos SlideShares
An Overview of Security in Distributed Database Management System
Carregando em ... 3
1
de
3
Top clipped slide
Ijetcas14 583
11 de Sep de 2014
•
0 gostou
1 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
186 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar agora
Baixar para ler offline
Denunciar
Engenharia
Security Design Issues in Distributed Databases
Iasir Journals
Seguir
Editor
Anúncio
Anúncio
Anúncio
Recomendados
An Overview of Security in Distributed Database Management System
IJSRD
1.8K visualizações
•
5 slides
Agent-Driven Distributed Data Mining
Editor IJCATR
660 visualizações
•
7 slides
thilaganga journal 1
thilaganga
158 visualizações
•
6 slides
Distributed virtual disk storage system
Alexander Decker
391 visualizações
•
7 slides
11.distributed virtual disk storage system
Alexander Decker
226 visualizações
•
8 slides
Ensuring secure transfer, access and storage over the cloud storage
eSAT Journals
139 visualizações
•
4 slides
Mais conteúdo relacionado
Apresentações para você
(19)
CREDENTIAL BASED MEDIATOR ARCHITECTURE FOR ACCESS CONTROL AND DATA INTEGRATIO...
IJNSA Journal
•
8 visualizações
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
•
26 visualizações
Distributed dbms cs712 power point slides lecture 1
Aimal Syeda
•
501 visualizações
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
•
89 visualizações
Implementation of Agent Based Dynamic Distributed Service
CSCJournals
•
266 visualizações
security issue
JAINIK PATEL
•
690 visualizações
Distributed Semantic Search System (DSSS)
Isuru Vincent
•
177 visualizações
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
•
213 visualizações
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
•
85 visualizações
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
•
395 visualizações
Unit 3 -Data storage and cloud computing
MonishaNehkal
•
935 visualizações
Paper id 212014106
IJRAT
•
269 visualizações
Secure and efficient transmission of medical images
eSAT Publishing House
•
340 visualizações
Information Retrieval based on Cluster Analysis Approach
AIRCC Publishing Corporation
•
256 visualizações
Volume 2-issue-6-1939-1944
Editor IJARCET
•
453 visualizações
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
•
163 visualizações
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
•
210 visualizações
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
•
13 visualizações
A study on security issues in cloud based e learning
Manimaran A
•
564 visualizações
Similar a Ijetcas14 583
(20)
Dynamic Resource Provisioning with Authentication in Distributed Database
Editor IJCATR
•
257 visualizações
Kamal Jyoti V3I5-0161
Kamal Jyoti
•
250 visualizações
50620130101004
IAEME Publication
•
425 visualizações
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
•
254 visualizações
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
•
27 visualizações
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
•
270 visualizações
Distributed dbms (ddbms)
JoylineChepkirui
•
93 visualizações
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
•
238 visualizações
11 vol3
Abhishek Kumar
•
443 visualizações
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
•
32 visualizações
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET Journal
•
8 visualizações
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
•
3 visualizações
Accessing secured data in cloud computing environment
IJNSA Journal
•
345 visualizações
A novel cloud storage system with support of sensitive data application
ijmnct
•
333 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
•
41 visualizações
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
•
25 visualizações
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
•
41 visualizações
Aw4103303306
IJERA Editor
•
390 visualizações
Bt9002 grid computing 1
Techglyphs
•
128 visualizações
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
•
256 visualizações
Anúncio
Mais de Iasir Journals
(20)
ijetcas14 650
Iasir Journals
•
446 visualizações
Ijetcas14 648
Iasir Journals
•
354 visualizações
Ijetcas14 647
Iasir Journals
•
448 visualizações
Ijetcas14 643
Iasir Journals
•
393 visualizações
Ijetcas14 641
Iasir Journals
•
371 visualizações
Ijetcas14 639
Iasir Journals
•
345 visualizações
Ijetcas14 632
Iasir Journals
•
417 visualizações
Ijetcas14 624
Iasir Journals
•
400 visualizações
Ijetcas14 619
Iasir Journals
•
316 visualizações
Ijetcas14 615
Iasir Journals
•
392 visualizações
Ijetcas14 608
Iasir Journals
•
271 visualizações
Ijetcas14 605
Iasir Journals
•
297 visualizações
Ijetcas14 604
Iasir Journals
•
520 visualizações
Ijetcas14 598
Iasir Journals
•
299 visualizações
Ijetcas14 594
Iasir Journals
•
222 visualizações
Ijetcas14 593
Iasir Journals
•
268 visualizações
Ijetcas14 591
Iasir Journals
•
281 visualizações
Ijetcas14 589
Iasir Journals
•
258 visualizações
Ijetcas14 585
Iasir Journals
•
221 visualizações
Ijetcas14 584
Iasir Journals
•
230 visualizações
Último
(20)
WPT presentation.pdf
Nahid1022
•
0 visão
Twitter_Hashtag_Prediction.pptx
SayaliKawale2
•
0 visão
Unit 4 Powder-metallurgy .pptx
ravikumark42
•
0 visão
INTERNAL COMBUSTION ENGINE 2.pdf
AmitkrGupta7
•
0 visão
The fuel system.pdf
kapunkumarnayak
•
0 visão
5G Technology.pptx
Mohit907861
•
0 visão
Pedia Case Presentation.pptx
Marjorie Grecia
•
0 visão
WIRELESS_SECURITY.pptx
AdityaKulkarni571462
•
0 visão
Heat treatment.pptx
ravikumark42
•
0 visão
Primary and secondary tillage.pptx
piyushkowe
•
0 visão
Ahras PPT (2).pptx
MuhammadSaadAbrar1
•
0 visão
Mutual-Exclusion Algorithm.ppt
ShikhaManrai1
•
0 visão
1ST CLASS.pptx
tdarunkumar21
•
0 visão
unit3.0.pptx
MDmanishDeshmukh
•
0 visão
Data_structure.pptx
priya415376
•
0 visão
Well Stimulation Treatments_previewwtrmrk.pdf
ssusera21b97
•
0 visão
International Journal of Multimedia & Its Applications (IJMA)
ijma
•
0 visão
Internship presentation.pptx
kirannayakar1
•
0 visão
BCE U3.pptx
Gate20241
•
0 visão
Engineering materials and metallurgy -Ferrous and Non Ferrous metals 1.pptx
ravikumark42
•
0 visão
Anúncio
Ijetcas14 583
International Association of
Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-583; © 2014, IJETCAS All Rights Reserved Page 215 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Security Design Issues in Distributed Databases Pakanati.Raja Sekhar Reddy@, Dr Syed Umar*, Narra.Sriram# @ B.Tech. Student, ECM dept.,KL University,Vaddeswaram, Guntur, AP, India *Assoc.Professor, ECM dept., K L University, Vaddeswaram, Guntur, AP, India # B. Tech. Student, CSE dept., K L University, Vaddeswaram, Guntur, AP, India __________________________________________________________________________________________ Abstract: In the rapid growth of networking and information technology expands the business worldwide. As distributed database became more popular, the need for improvement in distributed database management system become even more important. Database provides inbuilt security to manage different levels of data but if we apply overall security from accessing the different levels of user’s data to different levels of users, it will raise the performance complication and also slow down the normal function of the database server. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we review the most common as well as emerging security mechanism used in distributed database system. Keywords: Distributed database, distributed database security, distributed database architecture, distributed database retrieval problems, Concurrency control. ______________________________________________________________________________________ I. Introduction A Distributed database is a collection of databases which are distributed and then stored on multiple computers within a network. An application is able to access simultaneously and modify the data in several databases in a network. The database, link connection allows local users to access data on a remote database. In distributed database system, the major issue is security on data to be accessed at different levels of hierarchy. In a distributed database system, the database is stored on a number of computers. The computers in a distributed system communicate with each other through various communication media such as high-speed networks or telephone lines [1]. A database link connection allow local users to access data on a remote database for establishing these connections, each database in the distributed system must have a unique global database name in the network domain. The Distributed database management system (DDBMS) is a software that permits the management of the distributed database and makes the distribution transparent to the user. The main difference between centralized and distributed database is that the distributed databases are typically geographically separated and are separately administrated between local & global transactions. In a local transaction it access the data only from sites where the transaction originated, whereas in a global transaction on the other hand is one that either access data in a different site from the one at which the transaction was initiated or, accessed data in several different site [2]. II. Distributed Database Security The databases have been protected from external connections by firewalls or routers on the network outer limits with the database environment existing on the internal network opposed to being located within a demilitarized zone. Additional network security devices that detect and alert on malicious database protocol traffic include intrusion detection systems along with host-based intrusion detection systems [3]. Databases provide many layers and types of information security, typically specified in the data dictionary, including: a) Access control: Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security. b) Authentication: Authentication is the act of establishing or confirming something (or someone) as authentic, that is, the claims made by or about the subject are true. c) Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key Integrity. III. Distributed Database System The theory of distributed database came into reality during mid 1970. It was felt that many applications would be distributed in future and therefore the database had to be distributed also. Essentially a distributed database system (DDBS) is a collection of several logically related databases which are physically distributed in different computers or sites over a computer network [4].
Pakanati. Reddy et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 215-217 IJETCAS 14-583; © 2014, IJETCAS All Rights Reserved Page 216 While the users of distributed database have the impression that the whole database is local excepted for the possible communication delay between the sites. This is because a distributed database is a logical union of all the sites and the distribution is hidden from the users. DDBS is preferred over a non-distributed or centralized database system for various reasons. The design of responsible distributed database system is a key concern for information system. In high band-width network, latency and local processing are the most significant factors in query and update response time. Parallel processing can be used to minimize their effects, particularly if it is considered at design time. It is the judicious replication that enables parallelism to be effectively used. Distributed database design can thus be seen as an optimization problem requiring solutions to various interrelated problems: data fragmentation, data allocation and local optimization. Concurrency Control (CC) is another issue among database system. It permits user to access a distributed database in a multi-programmed fashion which preserving the illusion that each user is executing alone on a dedicated system. Another activity of Concurrency Control (CC) is to “Co-ordinating [5], concurrent accesses to a database in a multi user database management system (DDBMS). There are numbers of algorithms that provides Concurrency control, such as two phase locking, Time stamping, Multi-version timestamp, and Optimistic non- locking mechanism. Various methods provide better concurrency control than other depending on the systems [6]. IV. Distributed database Architecture The distributed database management system (DDBMS) involves a collection of sites interconnected by a network. Every site run one or, more of the following software modules: a Transaction Manager(TM), a Data Manager (DM) and a concurrency control scheduler or simply scheduler. A site can function as a client, a server or, both in client–server model. A client run only the TM module and a server run only the DM and scheduler module. All server stores a portion of the database. Each data item may be stored at any server or, redundantly at several servers. Figure -1 shows the system architecture for the client server model. The user’s interact with the DDBMS by executing transactions, which are on line queries or, application programmes. TMs supervise interaction between transaction and database. The TM at the site where the transaction originated is called the initiating TM. The indicating TM receives operations issued by a transaction, and forwards them to the appropriate schedulers. The goal of a scheduler is to order operations so that the resulting execution is correct. DMS manages the actual database by executing operations, and are responsible for recovery from failures. Transactions communicate with TMs which communicate with schedulers, DMs and it manages data. Architecturally, a DDBS consists of a set of query sites and a non-empty set of data sites. Data sites have data storage capability which the query sites do not. The latter only run the user interface in order to facilitate data access at data site. The problem of distributed query processing is to decide on a strategy for executing each query over the network in the most cost- effective way [7]. Figure 1: Architecture of a Distributed Database (DM Data manager TM Transaction manager) V. Security tools emerging in Distributed Database System: The emerging security tools used in distributed database system are data warehouses and data mining system, collaborative computing system, distributed object system and the web. The major issues here are ensuring that security is maintained in building a data ware house from the backend database systems and also enforcing appropriate access control technique when retrieving the data from warehouse. For example , security policies of the different data sources that from the warehouse have to be integrated to form a policy for the warehouse .This is not a straight forward task, as one has to maintain security rules during the transformation , then the warehouse security policy has to be enforced . In addition, the warehouse has to be audited. Ultimately, the
Pakanati. Reddy et
al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 215-217 IJETCAS 14-583; © 2014, IJETCAS All Rights Reserved Page 217 retrieval problem also becomes as issue here, For example the warehouse may store average salaries. A user can access average salaries and then deduce the individual salaries in the data sources, which may be sensitive and therefore, the inference problem could become an issue for the warehouse. To date, little work has been reported on security for the data warehouse as well as the retrieval problem for the warehouse. This is an area that needs much research intension. In data mining system it is being extended to function in a distributed environment. This system is called distributed data mining system & has received very little attention. Other emerging technologies that have evolved in some way from distributed database are called collaborative computing system, distributed object management system and the web. Much of the work on securing distributed database can be applied to securing collaborative computing system, through distributed object systems security, there is a lot of work by the object management group’s security special interest group. Presently there has been much work on securing the web as well. The main issue here is ensuring that the databases, the operating systems , the applications, web servers, the client and the network are not only secure, but are also securely integrated [8] . VI. Conclusion The distributed database systems are getting popular day by day. Several organizations are now deploying distributed database system. In this paper we introduce the different aspects related to distributed database such as database system concept, distributed database architecture, design of distributed database and also some security issues including multi level security in distributed database system. We also, describe the most common mechanism of discretionary security and stated the emerging security used in distributed system tools. We also believe that there is much scope for further research and experimentation on these issues. References [1] Swati Gupta, Kuntal Saroba, Bhawna, “Fundamental Research of Distributed Database”, International Journal of Computer Science and Management Studies, vol. 11, 2011, pp. 138-146. [2] Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, Prentice Hall Professional Technical Reference, Upper Saddle River, New Jersey, 2003. [3] Zhang Xing Hao Wei, “The structure design of database security monitoring system based on IDS”, IEEE Conference on Computer Engineering and Technology, 2010, vol. 3, pp. 450-453. [4] A.A.Akintola,G.A.Aderounmu and A.U.Osakwe,” Performing Modeling of an Enhanced Optimistic Locking Architecture for Concurrency Control in a Distributed Database System”, ACM vol.37, No.4, November 2005 [5] Simon Wiseman, DERA, Database Security: Retrospective and Way Forward, 2001. [6] Pfleeger, Charles P., (1989) Security in Computing. New Jersey: Prentice Hall. 1989. [7] Security Issues in Distributed Database System Model, MD.Tabrez quasim, Computer Science Department Faculty of Science T.M. Bhagalpur University tabrezquasim@gmail.com [8] A.A.Akintola,G.A.Aderounmu and A.U.Osakwe,” Performing Modeling of an Enhanced Optimistic Locking Architecture for Concurrency Control in a Distributed Database System”, ACM vol.37, No.4, November 2005
Anúncio