Security Issues in Distributed Database System Model

Authors

  • QUASIM MT Research Scholar, Computer Science Department Faculty of Science, T.M. Bhagalpur University

Keywords:

Distributed database management system, distributed database security, distributed database architecture, distributed database retrieval problems, Concurrency control

Abstract

This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system.

In this paper, we propose some solution for some security aspects such as multi-level access control, confidentiality, reliability, integrity and recovery that pertain to a distributed database system.

References

Bell, David and Jane Grisom, Distributed Database Systems. Workinham, England: Addison Wesley, 1992.

Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, Prentice Hall Professional Technical Reference, Upper Saddle River, New Jersey, 2003.

Haigh, J. T. et al., “The LDV Secure Relational DBMS Model,” In Database Security, IV: Status andProspects, S. Jajodia and C.E. Landwehr eds., pp. 265-269, North Holland: Elsevier, 1991.

İlker Köse, GYTE, Veri ve Ağ Güvenliği, Distributed Database Security, Spring 2002.

James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, Pearson Education, Inc, New York, 2003.

Paul Lothian and Peter Wenham, Database Security in Web Environment, 2001.

Pfleeger, Charles P., (1989) Security in Computing. New Jersey: Prentice Hall. 1989.

Simon Wiseman, DERA, Database Security: Retrospective and Way Forward, 2001.

Stefano Ceri, Giuseppe Pelagatti: Distributed Databases: Principles and Systems. McGraw-Hill Book Company 1984, ISBN 0-07-010829-3.

Thuraisingham B., Security for Distributed Database Systems, Computers & Security, 2000.

Thuraisingham, Bhavani and William Ford,“Security Constraint Processing In A Multilevel Secure Distributed Database Management System,” IEEE transactions on Knowledge and Data Engineering, v7 n2, pp. 274-293, April 1995.

"Components of a Distributed Database System”http://www.fi/~hhyotyni/latex/Final/node44.html, October 24, 2008.

“Object Oriented Databases ”http://www.comptechdoc.org/independent/database/basi cdb/dataobject.html,October 25, 2008.

“Network Databases,”http://wwwdb.web.cern.ch/wwwdb/aboutdbs/classification/network.html, October 25, 2008. 978-1

A.A.Akintola,G.A.Aderounmu and A.U.Osakwe,”Performing Modeling of an Enhanced Optimistic Locking Architecture for Concurrency Control in a Distributed Database System”,ACM vol.37, No.4, November 2005

Zakira Suliman Zubi “ On Distributed Database Security Aspects “ IEEE, 2009

Downloads

Published

2024-02-26

How to Cite

QUASIM, M. (2024). Security Issues in Distributed Database System Model. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(12), 396–399. Retrieved from https://ijact.in/index.php/j/article/view/69

Issue

Section

Original Research Article

Similar Articles

<< < 20 21 22 23 24 25 26 27 28 29 > >> 

You may also start an advanced similarity search for this article.