StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

High-Quality Distributed Database Systems - Research Paper Example

Cite this document
Summary
The paper "High-Quality Distributed Database Systems" highlights that the security components in the databases focus mainly on the general aspect of security enhancement but do not specify methodologies to be used in guaranteeing the ACID properties of database transactions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
High-Quality Distributed Database Systems
Read Text Preview

Extract of sample "High-Quality Distributed Database Systems"

10 June INTRODUCTION In the current speedy and constantly advancing technological world, the need tohave high quality distributed database systems is one of the most crucial subjects of concern. To be precise, having a well-organized database system is always an essential aspect particularly in promoting data privacy, security and availability of any business environment. Essentially, the chief purpose of using distributed databases is to guarantee data confidentiality, integrity and availability. On this basis, this paper has laid major emphasis on analyzing the subject of distributed databases via an account of the article that addresses Concurrency Control and Security issues of Distributed Databases (Vinod et al. 1). It is important to acknowledge that this article has outlined a significant set of valuable information about distributed systems. This is specifically on issues based on controlling concurrency of organization data and most importantly, the security of data and transactions handles by distributed database systems. The authors of the article address indicate that concurrency control and security threat is a very crucial subject of concern in distributed database networks. The article goes further to clarify that there has been no guarantee of execution of secure database transactions in most distributed databases. Specifically, the author outlines that, there is no clear platform for ascertaining that database transactions are always maintaining the ACID properties, which are atomicity, Consistency, Isolation and Durability (Vinod et al. 3). EXPLANATION OF THE PAPER This paper describes that there are a number of concerns in the design of most distributed databases, which have negatively affected the performance of their respective distributed networks. Specifically, concurrency issues in the transfer of data along with security of the transactions handled by these systems have been indicated as significant subjects of concern. In a distributed database, the database spread over a wide number of computers, which communicate and share data via a well designed of computer data network. The database applications connected to the distributed database system have to work transparently on the database fragments (Vinod et al. 2). The paper outlines that concurrency control is a database management activity that focuses on coordinating database manipulation processes by a concurrent access to data while potentially interfering with one another. The main subject of concern in concurrency control is to ascertain serialisability of transactions that are executed concurrently. In this sense, whenever transactions of a distributed database are concurrently executed, their respective read and write operations to the set same set of computer data can cause significant conflicting situations. To be precise, the concurrency control techniques applied in local structures of a singular databases (local level) need significant adjustments in order for them to be applied in distributed databases. This is because distributed systems need concurrency control to be applied not only the local level but also on the global level. This added layer in distributed databases brings in a significant set of complexities in the smooth implementation of concurrency control protocols (Vinod et al. 2). In terms of security, this paper indicates the following. In a distributed database, security entails protection of computer data from any unauthorized access, misuse and alteration. Distributed database security focuses on protecting the business data from users or software that has malicious intentions. To apply high quality security, distributed database apply four security components, which include encryption, access control, authorization and authentication. Authentication entails creation of a password that is transferred to the authentication server, which authenticates data access over the network. Secondly, authorization is implemented by use of a set of software servers to enable client computer access resources through its identity as indicated in the authentication server. On the other hand, encryption is applied through complex algorithms that are based on public and private key generation. These algorithms include Rivest-Shamir-Adleman (RSA) and Data Encryption Standard (DES). Lastly but certainly not the least, access control is implemented by use of access matrices along with access control lists and capability list (Vinod et al. 3). Upon a thorough analysis of the security measures found in distributed databases, the paper indicates that there are significant threats in the execution of transactions. In essence, lack of clear components or principles that specifically address confidentiality, integrity and availability of the distributed database transactions, it is clear that there are significant threats to the security of these transactions (Vinod et al. 1). MY OPINION It is vital to note that I agree with the key concepts laid in this article. The first concept, which is, concurrency control is a significant concern in the design, development and use of distributed databases. This is because, in order to ensure efficient management of concurrency, both the local and global level data levels of a distributed database need to be perfectly controlled. The use of Locking in controlling concurrency in a distributed database is a challenge particularly in managing data access by different clients at the database level. That is, it is not feasible enough to apply locking both at the local and global level of the distributed transactions. Secondly, I also agree that security is another concern in the implementation of transactions in a distributed database. It is important to make it clear that, for any database system to be considered quality it must guarantee confidentiality, integrity and availability not only for the normal network communication operations but also to each of the unique transactions. To be specific, its transactions must maintain atomicity, Consistency, Isolation Durability. However, all of the security components in a distributed database address general security mitigation techniques but do not specifically tell offer measures for ensuring transaction integrity is guaranteed. SUMMARY In conclusion, it is essential to acknowledge that this article has provided a quality set of subjects of concern in the design and development of high quality distributed databases. Key areas that the authors have laid emphasis on include concurrency control and security threats that exist in distributed databases. Concurrency control is a challenge in distributed databases mainly due to the fact they include another layer, which is the global level. In my opinion, I agree with this article mainly because applying concurrency control is significantly challenging to manage at both the local level and global level of a computer database. In addition, I also agree with this article in terms of security issues found in the distributed databases. This is because the security components in the databases focus mainly on the general aspect of security enhancement but do not specify methodologies to be used in guaranteeing the ACID properties of database transactions (Vinod et al. 3). Works Cited Vinod, Gupta, Jitendra Sheetlani, Dhiraj Gupta and Datta Shukla. Concurrency Control and Security issues of Distributed Databases Transaction: Research Journal of Engineering Sciences. PDF file. 10 Jun 2014. < http://www.isca.in/IJES/Archive/v1i2/10.ISCA-JEngS-2012-047.pdf > Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Distributed Databases Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1649466-distributed-databases
(Distributed Databases Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1649466-distributed-databases.
“Distributed Databases Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1649466-distributed-databases.
  • Cited: 0 times

CHECK THESE SAMPLES OF High-Quality Distributed Database Systems

What are the tradeoffs between relational and object-oriented databases and database management systems

In addition, the relational databases have offered a high-quality service in a lot of customary database systems.... This section of the paper will present a detailed analysis of some of the important aspects of relational, object-oriented databases and database management systems.... This section also outlines tradeoffs between relational, object-oriented databases and database management systems.... Tradeoffs between relational and object-oriented databases and database management systems ...
7 Pages (1750 words) Essay

Enterprise-Wide Knowledge Management Systems and Their Usage in Creating a Learning Organization

The paper "Enterprise-Wide Knowledge Management systems and Their Usage in Creating a Learning Organization" explores systems that are integrated through a variety of information technology systems to facilitate KM processes and improve knowledge transfer.... Dynamic organizations require systems that can collect data and documentation, store this information, and then ultimately distribute knowledge in digital format to a variety of internal and external end-users as a means of managing knowledge....
4 Pages (1000 words) Essay

Interoperability and Middleware

It is essential to state that interoperability and middleware are computing and programming systems that are used in resource and application management in the field of telecommunications and computer industry especially applied and used to develop required infrastructure in ICT (Pfaffenberger, 2003).... Furthermore, its software has been proven to be of quality provided heterogeneity is maintained, for instance, on systems written in different language programming; running on different hardware programs and operating systems; using different data representation; implementing unlike syntactic or semantics interpretations; and using different control platforms (Puder, Romer & Pilhofer, 2006) For interoperability heterogeneity to be realized there has to be a middleware software package....
4 Pages (1000 words) Research Paper

History in Distributed Databases

In this scenario, a distributed database design allows the organizations to divide a database over different hardware devices, but with central management control.... Normally, a distributed database is developed on the basis of business departments, or geographical areas or companies.... Moreover, they develop a distributed database to assist in running the operations of particular business units all the way through the company, at the same time as establishing and maintaining authority from a central server....
10 Pages (2500 words) Essay

Relational and Object-Oriented Databases

The integration and connectivity of individual systems provide support to connect stand-alone machines.... The paper 'Relational and Object-Oriented Databases' presents database technology which started from flat-file storages and over the years evolved into electronic data storage in the form of records and tables to complete relational and object-oriented databases.... This provides for client-server database architecture which gives a whole new dimension to the existing database structure....
8 Pages (2000 words) Case Study

Object Oriented Databases

These databases are: Object Oriented Database Management System (OODBMS) and Relational Database Management systems.... This paper has presented an overview of object oriented This paper has discussed some of the major advantages and disadvantages of object oriented databases in comparison with relational database management systems.... Without a doubt, a database is an excellent way to store and access data.... Additionally, there are many types of a database and each type is used in certain conditions....
6 Pages (1500 words) Research Paper

Studying at Masters Level and Research Methods

The author of this paper "Studying at Masters Level and Research Methods" examines the database clustering core attributes, the main types, the intended system capabilities, the objectives and the costs, the software used in the architecture of the research, and other details.... In the shared-nothing design, each node in the cluster holds one segment of the database, as well as to handle all the processing details in relation to data stored in the particular node....
15 Pages (3750 words) Assignment

Relational Database Management System and Web Integration

The systems used widely across the globe include SQLite (open source), PostgreSQL (open source), Microsoft SQL Server, MySQL (open source), and Oracle.... However, there are those businesses that participate in the operation of the application systems while using the flat files as a means for the storage of data (Anagnostopoulos, Zeadally & Exposito, 2016).... Such include the legacy batch systems, which do not have the capacity of supporting the transactions of online data....
11 Pages (2750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us