A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in a sharing mode, other transactions can only read it, but can not update it. If the traditional consistency control method has been used yet, the system’s concurrency will be inadequately influenced. So there are many new necessities for the consistency control and security in Mobile Real Time Distributed Database (MRTDDB). The problem not limited only to type of data (e.g. mobile or real-time databases). There are many aspects of data consistency problems in MRTDDB, such as inconsistency between characteristic and type of data; the inconsistency of topological relations after objects has been modified. In this paper, many cases of consistency are discussed. As the mobile computing becomes well-liked and the database grows with information sharing security is a big issue for researchers. Mutually both Consistency and Security of data is a big confront for researchers because whenever the data is not consistent and secure no maneuver on the data (e.g. transaction) is productive. It becomes more and more crucial when the transactions are used in non-traditional environment like Mobile, Distributed, Real Time and Multimedia databases. In this paper we raise the different aspects and analyze the available solution for consistency and security of databases. Traditional Database Security has focused primarily on creating user accounts and managing user rights to database objects. But in the mobility and drifting computing uses this database creating a new prospect for research. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates a critical need to amplify this focus.

Authors and Affiliations

Gyanendra Kr. Gupta , A. K. Sharma , Vishnu Swaroop

Keywords

Related Articles

Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies

Cloud computing is a general term for anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses web and central remote servers to maintain data and application...

Improving Ad Hoc Network Performances by Estimating Available Bandwidth

The term bandwidth refers to the data rate that a network link or a network path can transfer. Bandwidth is one of the uarantee attribute to measure the performance of the network. Measuring available bandwidth in ad ho...

An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing 

The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...

Integral System for Automation of Education Board and IT Association using Cloud and Mobilink.

Most of the educational boards and IT associates still use traditional and inefficient intellectual E-administration system for communicating with their valued clients. The clients may include the students in case of edu...

An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks

Routing is one of the most significant challenges in Vehicular ad hoc networks and is critical for the basic network operations. Nodes (vehicles) in a Vehicular ad hoc network are allowed to move in an uncontrolled manne...

Download PDF file
  • EP ID EP129473
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Gyanendra Kr. Gupta, A. K. Sharma, Vishnu Swaroop (2011). A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security. International Journal on Computer Science and Engineering, 3(2), 884-891. https://europub.co.uk/articles/-A-129473