SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
A Survey on Batch Stream Processing using Query
Replacement Technique to Avoid Database Risks
Pranav Talwar1
, D. H. Kulkarni2
1
Pune University, Smt.Kashibai Navale College of Engineering, Vadgaon(BK), Pune411041, India
2
Pune University, Smt.Kashibai Navale College of Engineering, Vadgaon(BK), Pune411041, India
Abstract: Due to drastic increasing in web applications and also internet users, there is huge number of transactions are happening at
server side. This in turn affects the database too. So when database is crowded with huge number of queries then database server
becomes so busy to handle these queries. So either these query will be executed in some delay of time or they vanish with the object over
weight. So proposed method is introduces an idea of using fuzzy logic with the batch stream processing of the queries which are stored
in the priority queue for avoiding database performance degradation.
Keywords: Fuzzy logic, Batch stream processing, Query replacement, Database Management
1. Introduction
Due to globalization of industries over wide range of area, it
has become essential for enterprises to extend their work-
force in order to meet the requirement. As a result the
volume and complexity of enterprise data also grow. The
information that are generated, processed, transfer, and store
by an enterprise plays a vital role among the asset of an
enterprise. In today’s data-driven world, Organizations often
use IT systems to store and retrieve vast amount of sensitive
data, which, if leaked, could be harmful to an organization
and may lose its competitive position in the market.
However, it is seen that system performance is highly
dependent on different queries and the data within the system
that constitute overall load rather than system size. Many
organization uses cloud for storing, retrieving and
manipulating data, because of its ease of access, integration,
portability, and security issue in corporate world. Issue that
lies within many enterprises is to deal with the ability to
meet their rising demand of work while reducing their
operational costs of hardware. To overcome the drawback
we have to define effective measures that guarantee a wise
usage of computing resources.
Information play a vital role in any organization and
management of data and preserving privacy is main concern
of organization. Database management not only provide
information retrieval but also deploy data integrity of the
stored data.
2. Literature Review
To ensure secure data integrity [1] presents misuse detection
paradigm called DEMIDS which is made-to-order to
relational database systems. DEMIDS uses audit log to keep
track on profile of user interaction with DBS. By keeping
track on profile we can detect misuse behavior, in particular
insider abuse. Although DEMIDS is helpful to detect both
interruption and insider abuse, DEMIDS play an important
role in detecting the mischievous behavior by legitimate
users who break their privileges. Hence DEMIDS is
particularly useful for internal control. DEMIDS also
considers the data structure and semantics species present in
the database schema through the view of distance measure.
Such system data is used to guide the frequent item sets to
search for frequent item sets which can effectively represent
the working scopes of users.
To enable access control over database system Role Base
Access Control (RBAC) facilitate the user to handle the
problem of illegal access to unauthenticated user.[2]
abbreviate a model of RBAC that introduces a novel medium
to measure the risk incurred with role misuse. It extends the
role of RBAC that provide valuable security for access
control. Depending upon each role we assign different risk
level that determine which user take what action on existing
database.
Communication and Collaboration is an important aspect of
information retrieval (IR) system. This concern is address by
sharing other user search experience which help to formulate
user queries .Approach [3] introduce, a collaborative
querying paradigm that helps users with query formulating
by finding previously submitted similar queries through
mining. Here in collaborative query approach a group of
similar queries cluster is formed atomically without
predetermined class description. Experimentally a hybrid
content-based and results-based approach, both of which
give better query clusters result , than using either of them
alone .
Most of databases administrators reduce workloads by
aborting or pausing a queries and thereby increase system
performance. such a view is not efficient for several reason
like, aborting queries that may use unwanted resources
without satisfying the need of user queries. Our decision is
accomplished by evaluating these view of formulating
queries and taking appropriate actions we can minimize
impacts of resource demanding queries on some systems. Do
deal with this, we must know the level of acceptance of the
systems .[4] adapted a novel base approach which
incorporate Multi–Level Security (MLS) access control
model that is used to develop a risk-adaptive access control
model. This new model is known as Fuzzy Logic control
Paper ID: SUB1582 265Paper ID: SUB1582 265
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
system which can even allow risky information needed by a
user, provided the risk can be controlled.
[5] Exploits, available information present in the logs in
order to measure the semantic similarity between the queries
from user and that present in the logs. It focuses on the
concept of query flow graph which is used for graph-based
representation of a query log. The query flow graph
integrates query reformulation for many clients, similarity
between query is obtained by extracting appropriate sub
graph on a low Euclidean space .Further, the resultant query
similarity is use for application like query recommendation.
In order to share information over a dynamic and distributed
network, an attempt has been evolved for risk base access
control system. To overcome the above problem of risk
through the network,[6] developed a framework based on
Risk Base Access control mechanism that take decision on
risk associated with operational need and given request. The
propose framework estimate risk and impact score which
depend on object sensitivity-based approach and a subject
trustworthiness-based approach, further two additional
approaches that are used for determining threat ordering are
based on the difference between object sensitivity and
subject trustworthiness.
[7] develops a model that defines a problem of insider attack.
The insider attack address toward the risk assessment policy
of any organization that are bounded with security policy,
that indicate which user are authorized to access what
resources and when. Their work contributes to analyze the
statics behavior of user capabilities and restriction of given
policy at runtime. Often times user do not get a satisfactory
result over the fired query which may result in unsatisfactory
result.[8] demonstrate a framework that depict the query over
database in domain independent way .They present AOIM a
user and domain dependent approach for answering a
relevant queries from database. It efficiently extract and
automatically rank the tuples that satisfy query and the
structure of the relations projected by the databases. A test
has been carried out in term of satisfying user by considering
only the information contained in the dataset. AOIM has
been implemented without affecting the internal structure of
database and therefore it can be easily implemented over any
web database.[9] narrates a generic automated ranking
paradigm for SQL database which implement a ranking
algorithm for relational DBMS. It compromise of two major
component query processing component and pre- processing
component that minimize the impact on query processing.
As a enterprise grow the functional requirement and
administrative domains also spans with time. Control
policies o an enterprise typically express the requirements of
an authorization constraints.[10] presents a work on X-
GTRBAC Admin that focuses on administration model that
aims at enabling the role of administration in role-based
access control (RBAC) policies in the presence of
constraints. These model represents a solution to the
administration problem for enterprise-wide access control,
which not only includes access control management for users
but also allow decentralization of administration policy tasks
through the abstraction of administrative domains resources
within a single domain. [11] describe , a reference base
model for RBCA, over past decade it has seen that many
system result in confusion of its utility and meaning. To
overcome the drawback NIST model resolve the situation by
taking idea from prior RBAC model .Here the system is
organize into four level of RBAC namely flat ,hierarchical,
constrained and symmetric RBCA with increasing functional
capabilities.[12] depicted a efficient model for predicting the
essential query over the database. It proposed a prediction
method for unstructured data to measure the difficulty of
query over database using ranking principle. This method
predict the difficulty of query with low errors overheads and
structured robustness score based on the query similarity
between the original query and the corrupted version of same
query present in the database. It uses both the INEX and
Research benchmarks for keyword search on database that
predict the difficulty of query efficiently and effectively.
[13] convey a method for the automated segmentation of
users’ query streams into hierarchical units. This system uses
a set of query log, setoff syntactic ,temporal and web search
features that can predict goal and mission boundaries as well
when use independently .This approach adopts a hierarchical
model for grouping a set of queries that will allow user more
precisely found the required data over a paradigm. It allow
us to more accurately measure time required for user queries
to complete its task. User query is not evaluated on a per-
query basis, but on the basis of user tasks. A cooperative
approach was developed for fuzzy relational queries to avoid
empty answer to the user.[14] proposed a relaxation
mechanism for more complex queries .This mechanism assist
On transformation by applying a query tolerance to fuzzy
predicate contained in a query ,which can be conveniently
used in terms of parametrized proxy relation. Predicate of
fuzzy is obtained by simply performing arithmetic operation
on fuzzy numbers. It is concluded that a proximity relation is
define in a relative notion which play a key role.
3. Conclusion
The proposed approach by using fuzzy logic successfully
identifies the database server performance parameter and it
break down points. Based on these things our system
identifies the high priority queries from the priority queue
depended on the extracted features. System introduces an
idea of clustering these queries from the priority queue based
on the feature score. Then these queries are batched based on
the query type to commit in single go to yield best
performance of the database even in the on the high risk
scenario.
References
[1] K. Levitt C. Y. Chung, “M. Gertz. Demids: A misuse
detection system for database systems”, In Proceeding
of the Integrity and Internal Control in Information
System, 1999.
[2] EbruCelikel, Murat Kantarcioglu,
BhavaniThuraisingham, DilsadCavus,” A Model for
Risk Adaptive Access Control in RBAC Employed
Distributed Environments”,University of Texas at Dallas
Richardson, TX 75083,2007
[3] Lin Fu, Dion Hoe-Lian Goh, Schubert Shou-Boon Foo,
YohanSupangat,” Collaborative querying for enhanced
Paper ID: SUB1582 266Paper ID: SUB1582 266
International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438
Volume 4 Issue 1, January 2015
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
information retrieval”,Research and Advanced
Technology for Digital LibrariesLecture Notes in
Computer Science
[4] Pau–Chen Cheng, Pankaj Rohatgi Claudia Keser ,Paul
A. Karger, Grant M. Wagner Angela
SchuettReninger,”Fuzzy Multi–Level Security : An
Experiment on Quantified Risk–Adaptive Access
Control”Security and Privacy, SP '07. IEEE Symposium
on 2007.
Volume 3232,2004
[5] C. Castillo A. Gionis I. Bordino, D. Donato. “Query
similarity by projecting the query-flow graph”. SI-
GIR'10, July 19-23 2010.
[6] VenkataBhamidipati ,SavithKandala, Ravi Sandhu. “A
framework for threat assessment in access control
systems" that appeared in Proceedings of 27th IFIP TC
11 Information Security and Privacy Conference (SEC
2012), 2012.
[7] Jason Crampton, Michael Huth,” Detecting and
Countering Insider Threats: Can Policy-Based Access
Control Help”, Proceeding of 5th
International Workshop
on Security and Trust management,2009
[8] S. Kambhampti U. Nambiar,” Answering imprecise
database queries: A novel approach”, WIDM, New
Orleans, Louisiana, USA, 2003.
[9] G. Das A. Gionis S. Agrawal, S. Chaudhuri, ”Auto-
mated ranking of database query results” Proceedings of
the 2003 CIDR Conference.
[10]E. Bertino A. Ghafoor J. Joshi R. Bhatti, B. Sha_q. X-
gtrbac admin” A decentralized administration model for
enterprise-wide access control.” ACM Transactions on
Information Security 8, pages 388{423,2005}.
[11]F. D. Ferraiolo R. Sandhu and D. R. Kuhn. “The nist
model for role-based access control”, Towards a unied
standard. Information Technology Lab, NIST,
September 2000.
[12]Shiwen Cheng, ArashTermehchy, and VagelisHristidis,”
Efficient Prediction of Difficult Keyword Queries over
Databases”, Knowledge (Volume:26 , Issue: 6 ),2013.
[13]Rosie Jones ,Kristina Lisa Klinkner,”Beyond the
Session Timeout: Automatic Hierarchical Segmentation
of Search Topics in Query Logs”, Proceeding CIKM ’08
Proceeding of 17th
ACM conference on Information and
knowledge management,2008.
[14]patricbosc,allelhadjali and olivierpivert, “Towards a
tolerance base technique for cooperative answering of
fuzzy queries against regular databases”, springer verlag
berlin heidelberg,2005.
Paper ID: SUB1582 267Paper ID: SUB1582 267

Mais conteúdo relacionado

Mais procurados

Identification of important features and data mining classification technique...
Identification of important features and data mining classification technique...Identification of important features and data mining classification technique...
Identification of important features and data mining classification technique...IJECEIAES
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...IRJET Journal
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentIRJET Journal
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) irjes
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALUML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALijcsit
 
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...IJERA Editor
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchIGEEKS TECHNOLOGIES
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchLeMeniz Infotech
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profilingijdmtaiir
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17redpel dot com
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...IRJET Journal
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...IRJET Journal
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
 

Mais procurados (20)

Identification of important features and data mining classification technique...
Identification of important features and data mining classification technique...Identification of important features and data mining classification technique...
Identification of important features and data mining classification technique...
 
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES) International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVALUML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
 
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
 
Research-KS-Jun2015
Research-KS-Jun2015Research-KS-Jun2015
Research-KS-Jun2015
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Performance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User ProfilingPerformance Analysis of Selected Classifiers in User Profiling
Performance Analysis of Selected Classifiers in User Profiling
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
 

Destaque

Destaque (9)

Multimedia Solutions
Multimedia SolutionsMultimedia Solutions
Multimedia Solutions
 
Digipaks 3
Digipaks 3Digipaks 3
Digipaks 3
 
Sub1543
Sub1543Sub1543
Sub1543
 
The Status of the Highway Trust Fund and Budget Basics for the Treatment of N...
The Status of the Highway Trust Fund and Budget Basics for the Treatment of N...The Status of the Highway Trust Fund and Budget Basics for the Treatment of N...
The Status of the Highway Trust Fund and Budget Basics for the Treatment of N...
 
Rugby in Oaxaca
Rugby in OaxacaRugby in Oaxaca
Rugby in Oaxaca
 
15 Strategies that Built an 8 Figure Business
15 Strategies that Built an 8 Figure Business15 Strategies that Built an 8 Figure Business
15 Strategies that Built an 8 Figure Business
 
Comedor Doña Deme
Comedor Doña DemeComedor Doña Deme
Comedor Doña Deme
 
All Travel is Local
All Travel is LocalAll Travel is Local
All Travel is Local
 
Ecotourism Emerging Industry Forum (2005)
Ecotourism Emerging Industry Forum (2005)Ecotourism Emerging Industry Forum (2005)
Ecotourism Emerging Industry Forum (2005)
 

Semelhante a Sub1582

A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Enhancing highly-collaborative access control system using a new role-mappin...
Enhancing highly-collaborative access control system using a  new role-mappin...Enhancing highly-collaborative access control system using a  new role-mappin...
Enhancing highly-collaborative access control system using a new role-mappin...IJECEIAES
 
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP Server
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP ServerAn Anomaly Detection System for Ecommerce Sites Hosted on a LAMP Server
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP ServerNathanael Asaam
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageIOSR Journals
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET Journal
 
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERSN ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERScsandit
 
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageSurvey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageIRJET Journal
 
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud ApplicationsSupport for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applicationszillesubhan
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data IJECEIAES
 
Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  dannyijwest
 
Optimization of resource allocation in computational grids
Optimization of resource allocation in computational gridsOptimization of resource allocation in computational grids
Optimization of resource allocation in computational gridsijgca
 
Iss 6
Iss 6Iss 6
Iss 6ijgca
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemCSCJournals
 

Semelhante a Sub1582 (20)

A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Enhancing highly-collaborative access control system using a new role-mappin...
Enhancing highly-collaborative access control system using a  new role-mappin...Enhancing highly-collaborative access control system using a  new role-mappin...
Enhancing highly-collaborative access control system using a new role-mappin...
 
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP Server
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP ServerAn Anomaly Detection System for Ecommerce Sites Hosted on a LAMP Server
An Anomaly Detection System for Ecommerce Sites Hosted on a LAMP Server
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record Linkage
 
Access control data security
Access control data securityAccess control data security
Access control data security
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERSN ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
 
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug TriageSurvey on Software Data Reduction Techniques Accomplishing Bug Triage
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
 
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud ApplicationsSupport for Goal Oriented Requirements Engineering in Elastic Cloud Applications
Support for Goal Oriented Requirements Engineering in Elastic Cloud Applications
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
 
Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  
 
Optimization of resource allocation in computational grids
Optimization of resource allocation in computational gridsOptimization of resource allocation in computational grids
Optimization of resource allocation in computational grids
 
Iss 6
Iss 6Iss 6
Iss 6
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
 
50120140504006
5012014050400650120140504006
50120140504006
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management System
 

Mais de International Journal of Science and Research (IJSR)

Mais de International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

Sub1582

  • 1. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY A Survey on Batch Stream Processing using Query Replacement Technique to Avoid Database Risks Pranav Talwar1 , D. H. Kulkarni2 1 Pune University, Smt.Kashibai Navale College of Engineering, Vadgaon(BK), Pune411041, India 2 Pune University, Smt.Kashibai Navale College of Engineering, Vadgaon(BK), Pune411041, India Abstract: Due to drastic increasing in web applications and also internet users, there is huge number of transactions are happening at server side. This in turn affects the database too. So when database is crowded with huge number of queries then database server becomes so busy to handle these queries. So either these query will be executed in some delay of time or they vanish with the object over weight. So proposed method is introduces an idea of using fuzzy logic with the batch stream processing of the queries which are stored in the priority queue for avoiding database performance degradation. Keywords: Fuzzy logic, Batch stream processing, Query replacement, Database Management 1. Introduction Due to globalization of industries over wide range of area, it has become essential for enterprises to extend their work- force in order to meet the requirement. As a result the volume and complexity of enterprise data also grow. The information that are generated, processed, transfer, and store by an enterprise plays a vital role among the asset of an enterprise. In today’s data-driven world, Organizations often use IT systems to store and retrieve vast amount of sensitive data, which, if leaked, could be harmful to an organization and may lose its competitive position in the market. However, it is seen that system performance is highly dependent on different queries and the data within the system that constitute overall load rather than system size. Many organization uses cloud for storing, retrieving and manipulating data, because of its ease of access, integration, portability, and security issue in corporate world. Issue that lies within many enterprises is to deal with the ability to meet their rising demand of work while reducing their operational costs of hardware. To overcome the drawback we have to define effective measures that guarantee a wise usage of computing resources. Information play a vital role in any organization and management of data and preserving privacy is main concern of organization. Database management not only provide information retrieval but also deploy data integrity of the stored data. 2. Literature Review To ensure secure data integrity [1] presents misuse detection paradigm called DEMIDS which is made-to-order to relational database systems. DEMIDS uses audit log to keep track on profile of user interaction with DBS. By keeping track on profile we can detect misuse behavior, in particular insider abuse. Although DEMIDS is helpful to detect both interruption and insider abuse, DEMIDS play an important role in detecting the mischievous behavior by legitimate users who break their privileges. Hence DEMIDS is particularly useful for internal control. DEMIDS also considers the data structure and semantics species present in the database schema through the view of distance measure. Such system data is used to guide the frequent item sets to search for frequent item sets which can effectively represent the working scopes of users. To enable access control over database system Role Base Access Control (RBAC) facilitate the user to handle the problem of illegal access to unauthenticated user.[2] abbreviate a model of RBAC that introduces a novel medium to measure the risk incurred with role misuse. It extends the role of RBAC that provide valuable security for access control. Depending upon each role we assign different risk level that determine which user take what action on existing database. Communication and Collaboration is an important aspect of information retrieval (IR) system. This concern is address by sharing other user search experience which help to formulate user queries .Approach [3] introduce, a collaborative querying paradigm that helps users with query formulating by finding previously submitted similar queries through mining. Here in collaborative query approach a group of similar queries cluster is formed atomically without predetermined class description. Experimentally a hybrid content-based and results-based approach, both of which give better query clusters result , than using either of them alone . Most of databases administrators reduce workloads by aborting or pausing a queries and thereby increase system performance. such a view is not efficient for several reason like, aborting queries that may use unwanted resources without satisfying the need of user queries. Our decision is accomplished by evaluating these view of formulating queries and taking appropriate actions we can minimize impacts of resource demanding queries on some systems. Do deal with this, we must know the level of acceptance of the systems .[4] adapted a novel base approach which incorporate Multi–Level Security (MLS) access control model that is used to develop a risk-adaptive access control model. This new model is known as Fuzzy Logic control Paper ID: SUB1582 265Paper ID: SUB1582 265
  • 2. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY system which can even allow risky information needed by a user, provided the risk can be controlled. [5] Exploits, available information present in the logs in order to measure the semantic similarity between the queries from user and that present in the logs. It focuses on the concept of query flow graph which is used for graph-based representation of a query log. The query flow graph integrates query reformulation for many clients, similarity between query is obtained by extracting appropriate sub graph on a low Euclidean space .Further, the resultant query similarity is use for application like query recommendation. In order to share information over a dynamic and distributed network, an attempt has been evolved for risk base access control system. To overcome the above problem of risk through the network,[6] developed a framework based on Risk Base Access control mechanism that take decision on risk associated with operational need and given request. The propose framework estimate risk and impact score which depend on object sensitivity-based approach and a subject trustworthiness-based approach, further two additional approaches that are used for determining threat ordering are based on the difference between object sensitivity and subject trustworthiness. [7] develops a model that defines a problem of insider attack. The insider attack address toward the risk assessment policy of any organization that are bounded with security policy, that indicate which user are authorized to access what resources and when. Their work contributes to analyze the statics behavior of user capabilities and restriction of given policy at runtime. Often times user do not get a satisfactory result over the fired query which may result in unsatisfactory result.[8] demonstrate a framework that depict the query over database in domain independent way .They present AOIM a user and domain dependent approach for answering a relevant queries from database. It efficiently extract and automatically rank the tuples that satisfy query and the structure of the relations projected by the databases. A test has been carried out in term of satisfying user by considering only the information contained in the dataset. AOIM has been implemented without affecting the internal structure of database and therefore it can be easily implemented over any web database.[9] narrates a generic automated ranking paradigm for SQL database which implement a ranking algorithm for relational DBMS. It compromise of two major component query processing component and pre- processing component that minimize the impact on query processing. As a enterprise grow the functional requirement and administrative domains also spans with time. Control policies o an enterprise typically express the requirements of an authorization constraints.[10] presents a work on X- GTRBAC Admin that focuses on administration model that aims at enabling the role of administration in role-based access control (RBAC) policies in the presence of constraints. These model represents a solution to the administration problem for enterprise-wide access control, which not only includes access control management for users but also allow decentralization of administration policy tasks through the abstraction of administrative domains resources within a single domain. [11] describe , a reference base model for RBCA, over past decade it has seen that many system result in confusion of its utility and meaning. To overcome the drawback NIST model resolve the situation by taking idea from prior RBAC model .Here the system is organize into four level of RBAC namely flat ,hierarchical, constrained and symmetric RBCA with increasing functional capabilities.[12] depicted a efficient model for predicting the essential query over the database. It proposed a prediction method for unstructured data to measure the difficulty of query over database using ranking principle. This method predict the difficulty of query with low errors overheads and structured robustness score based on the query similarity between the original query and the corrupted version of same query present in the database. It uses both the INEX and Research benchmarks for keyword search on database that predict the difficulty of query efficiently and effectively. [13] convey a method for the automated segmentation of users’ query streams into hierarchical units. This system uses a set of query log, setoff syntactic ,temporal and web search features that can predict goal and mission boundaries as well when use independently .This approach adopts a hierarchical model for grouping a set of queries that will allow user more precisely found the required data over a paradigm. It allow us to more accurately measure time required for user queries to complete its task. User query is not evaluated on a per- query basis, but on the basis of user tasks. A cooperative approach was developed for fuzzy relational queries to avoid empty answer to the user.[14] proposed a relaxation mechanism for more complex queries .This mechanism assist On transformation by applying a query tolerance to fuzzy predicate contained in a query ,which can be conveniently used in terms of parametrized proxy relation. Predicate of fuzzy is obtained by simply performing arithmetic operation on fuzzy numbers. It is concluded that a proximity relation is define in a relative notion which play a key role. 3. Conclusion The proposed approach by using fuzzy logic successfully identifies the database server performance parameter and it break down points. Based on these things our system identifies the high priority queries from the priority queue depended on the extracted features. System introduces an idea of clustering these queries from the priority queue based on the feature score. Then these queries are batched based on the query type to commit in single go to yield best performance of the database even in the on the high risk scenario. References [1] K. Levitt C. Y. Chung, “M. Gertz. Demids: A misuse detection system for database systems”, In Proceeding of the Integrity and Internal Control in Information System, 1999. [2] EbruCelikel, Murat Kantarcioglu, BhavaniThuraisingham, DilsadCavus,” A Model for Risk Adaptive Access Control in RBAC Employed Distributed Environments”,University of Texas at Dallas Richardson, TX 75083,2007 [3] Lin Fu, Dion Hoe-Lian Goh, Schubert Shou-Boon Foo, YohanSupangat,” Collaborative querying for enhanced Paper ID: SUB1582 266Paper ID: SUB1582 266
  • 3. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438 Volume 4 Issue 1, January 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY information retrieval”,Research and Advanced Technology for Digital LibrariesLecture Notes in Computer Science [4] Pau–Chen Cheng, Pankaj Rohatgi Claudia Keser ,Paul A. Karger, Grant M. Wagner Angela SchuettReninger,”Fuzzy Multi–Level Security : An Experiment on Quantified Risk–Adaptive Access Control”Security and Privacy, SP '07. IEEE Symposium on 2007. Volume 3232,2004 [5] C. Castillo A. Gionis I. Bordino, D. Donato. “Query similarity by projecting the query-flow graph”. SI- GIR'10, July 19-23 2010. [6] VenkataBhamidipati ,SavithKandala, Ravi Sandhu. “A framework for threat assessment in access control systems" that appeared in Proceedings of 27th IFIP TC 11 Information Security and Privacy Conference (SEC 2012), 2012. [7] Jason Crampton, Michael Huth,” Detecting and Countering Insider Threats: Can Policy-Based Access Control Help”, Proceeding of 5th International Workshop on Security and Trust management,2009 [8] S. Kambhampti U. Nambiar,” Answering imprecise database queries: A novel approach”, WIDM, New Orleans, Louisiana, USA, 2003. [9] G. Das A. Gionis S. Agrawal, S. Chaudhuri, ”Auto- mated ranking of database query results” Proceedings of the 2003 CIDR Conference. [10]E. Bertino A. Ghafoor J. Joshi R. Bhatti, B. Sha_q. X- gtrbac admin” A decentralized administration model for enterprise-wide access control.” ACM Transactions on Information Security 8, pages 388{423,2005}. [11]F. D. Ferraiolo R. Sandhu and D. R. Kuhn. “The nist model for role-based access control”, Towards a unied standard. Information Technology Lab, NIST, September 2000. [12]Shiwen Cheng, ArashTermehchy, and VagelisHristidis,” Efficient Prediction of Difficult Keyword Queries over Databases”, Knowledge (Volume:26 , Issue: 6 ),2013. [13]Rosie Jones ,Kristina Lisa Klinkner,”Beyond the Session Timeout: Automatic Hierarchical Segmentation of Search Topics in Query Logs”, Proceeding CIKM ’08 Proceeding of 17th ACM conference on Information and knowledge management,2008. [14]patricbosc,allelhadjali and olivierpivert, “Towards a tolerance base technique for cooperative answering of fuzzy queries against regular databases”, springer verlag berlin heidelberg,2005. Paper ID: SUB1582 267Paper ID: SUB1582 267