A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional relational database, data consistency was controlled by consistency control mechanism when a data object is locked in a sharing mode, other transactions can only read it, but can not update it. If the traditional consistency control method has been used yet, the system’s concurrency will be inadequately influenced. So there are many new necessities for the consistency control and security in Mobile Real Time Distributed Database (MRTDDB). The problem not limited only to type of data (e.g. mobile or real-time databases). There are many aspects of data consistency problems in MRTDDB, such as inconsistency between characteristic and type of data; the inconsistency of topological relations after objects has been modified. In this paper, many cases of consistency are discussed. As the mobile computing becomes well-liked and the database grows with information sharing security is a big issue for researchers. Mutually both Consistency and Security of data is a big confront for researchers because whenever the data is not consistent and secure no maneuver on the data (e.g. transaction) is productive. It becomes more and more crucial when the transactions are used in non-traditional environment like Mobile, Distributed, Real Time and Multimedia databases. In this paper we raise the different aspects and analyze the available solution for consistency and security of databases. Traditional Database Security has focused primarily on creating user accounts and managing user rights to database objects. But in the mobility and drifting computing uses this database creating a new prospect for research. The wide spread use of databases over the web, heterogeneous client-server architectures, application servers, and networks creates a critical need to amplify this focus.
Authors and Affiliations
Gyanendra Kr. Gupta , A. K. Sharma , Vishnu Swaroop
Justified Cross-Site Scripting Attacks Prevention from Client-Side
Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScrip...
Fast Pedestrian Detection using Smart ROI separation and Integral image based Feature Extraction
This paper discusses a fast pedestrian detection system for near infrared imaging system. The Advanced Driver Assistance Systems include pedestrian detection system to avoid accidents. Most pedestrian detection systems p...
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...
Prediction of Electrochemical Machining Process Parameters using Artificial Neural Networks
Electrochemical machining (ECM) is a non-traditional machining process used mainly to cut hard or difficult to cut metals, where the application of a more traditional process is not convenient. It offers several special...
Novel Sorting Algorithm
Sorting has become a stand in need of prosaic life activities. Sorting in computer science alluded to as ordering deals with arranging elements of a list or a set of records of a file in ascending or descending order. We...