A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in a sharing mode, other transactions can only read it, but can not update it. If the traditional consistency control method has been used yet, the system’s concurrency will be inadequately influenced. So there are many new necessities for the consistency control and security in Mobile Real Time Distributed Database (MRTDDB). The problem not limited only to type of data (e.g. mobile or real-time databases). There are many aspects of data consistency problems in MRTDDB, such as inconsistency between characteristic and type of data; the inconsistency of topological relations after objects has been modified. In this paper, many cases of consistency are discussed. As the mobile computing becomes well-liked and the database grows with information sharing security is a big issue for researchers. Mutually both Consistency and Security of data is a big confront for researchers because whenever the data is not consistent and secure no maneuver on the data (e.g. transaction) is productive. It becomes more and more crucial when the transactions are used in non-traditional environment like Mobile, Distributed, Real Time and Multimedia databases. In this paper we raise the different aspects and analyze the available solution for consistency and security of databases. Traditional Database Security has focused primarily on creating user accounts and managing user rights to database objects. But in the mobility and drifting computing uses this database creating a new prospect for research. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates a critical need to amplify this focus.
Authors and Affiliations
Gyanendra Kr. Gupta , A. K. Sharma , Vishnu Swaroop
Mining Weighted Association Rule using FP – tree
The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same si...
MATLAB Simulation of Fuzzy Traffic Controller for Multilane Isolated Intersection
This paper presents a MATLAB simulation of fuzzy traffic ontroller for controlling traffic flow at multilane isolated ignalized intersection. The controller is developed based on the waiting time and vehicles queue le...
Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed bro...
Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules
A fuzzy filter is constructed from a set of fuzzy IF-THEN rules, these fuzzy rules come either from human experts or by matching input-output pairs .in this paper we propose a new fuzzy filter for the noise reduction of...
Superresolution: A Novel Application to Image Restoration
The subject of extracting particular high-resolution data from low-resolution images is one of the most important digital image processing applications in recent years, attracting much research. This paper shows how to i...