A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in a sharing mode, other transactions can only read it, but can not update it. If the traditional consistency control method has been used yet, the system’s concurrency will be inadequately influenced. So there are many new necessities for the consistency control and security in Mobile Real Time Distributed Database (MRTDDB). The problem not limited only to type of data (e.g. mobile or real-time databases). There are many aspects of data consistency problems in MRTDDB, such as inconsistency between characteristic and type of data; the inconsistency of topological relations after objects has been modified. In this paper, many cases of consistency are discussed. As the mobile computing becomes well-liked and the database grows with information sharing security is a big issue for researchers. Mutually both Consistency and Security of data is a big confront for researchers because whenever the data is not consistent and secure no maneuver on the data (e.g. transaction) is productive. It becomes more and more crucial when the transactions are used in non-traditional environment like Mobile, Distributed, Real Time and Multimedia databases. In this paper we raise the different aspects and analyze the available solution for consistency and security of databases. Traditional Database Security has focused primarily on creating user accounts and managing user rights to database objects. But in the mobility and drifting computing uses this database creating a new prospect for research. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates a critical need to amplify this focus.
Authors and Affiliations
Gyanendra Kr. Gupta , A. K. Sharma , Vishnu Swaroop
An Overview on Intrusion Detection in Manet
A mobile ad hoc network (MANET) is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now days. A MANETS are the networks that are building, when som...
Fuzzy Rule Based System to Characterize the Decision Making Process in Share Market
This research work will help the customer for decision making in share market, based on fuzzy rule based system. Past performance data could be used to overcome uncertainty , vagueness and imprecision of share market. Si...
Improved Fuzzy C-Means Algorithm for MR Brain Image Segmentation
Segmentation is an important aspect of medical image processing, where Clustering approach is widely used in biomedical applications particularly for brain tumor detection in abnormal Magnetic Resonance Images (MRI). Fuz...
Efficient Power Utilization Techniques for Wireless Sensor Networks – A Survey
Micro-sensor networks are widely deployed sensor network in typical geographical areas where human intervention is almost impossible. A WSN is a collection of several small energy limited sensors. These devices are auton...
The Impact of Social Network Usage on University Students Academic Performance: A Case Study of Benue State University Makurdi, Nigeria.
Advancement in technology and the increased availability of internet enabled handheld devices have significantly increased students’ access and use of the internet. The use of social media is enhanced by the availability...