CFP last date
20 May 2024
Reseach Article

A Resilient Failure Evaluation and Patch-up (R-FEP) Algorithm for Heterogeneous Distributed Databases

by Dharavath Ramesh, Chiranjeev Kumar, V. Vijay Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 9
Year of Publication: 2013
Authors: Dharavath Ramesh, Chiranjeev Kumar, V. Vijay Kumar
10.5120/10108-4765

Dharavath Ramesh, Chiranjeev Kumar, V. Vijay Kumar . A Resilient Failure Evaluation and Patch-up (R-FEP) Algorithm for Heterogeneous Distributed Databases. International Journal of Computer Applications. 62, 9 ( January 2013), 20-25. DOI=10.5120/10108-4765

@article{ 10.5120/10108-4765,
author = { Dharavath Ramesh, Chiranjeev Kumar, V. Vijay Kumar },
title = { A Resilient Failure Evaluation and Patch-up (R-FEP) Algorithm for Heterogeneous Distributed Databases },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number9/10108-4765/ },
doi = { 10.5120/10108-4765 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:20.640182+05:30
%A Dharavath Ramesh
%A Chiranjeev Kumar
%A V. Vijay Kumar
%T A Resilient Failure Evaluation and Patch-up (R-FEP) Algorithm for Heterogeneous Distributed Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 9
%P 20-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Blocking methodologies sometimes fail to stop malicious things. Attacks on data oriented applications are a serious threat as per the database management systems concern. The required objective of such environment is to find out the mean time attacks and patch up the failures within the stipulated time. This manuscript represents a failure (attacked) evaluation and patch up instances in distributed database systems. The problems like partition, transaction commitment, and failures state that recovery is much more challenging in databases. This manuscript focuses on the challenges and makes an efficient concern with respect to distributed failure evaluation and recovery.

References
  1. Stefano Ceri and Giuseppe, Distributed Databases Principles and Systems. India: Tata McGraw-Hill, 2008, pp. 176 -178.
  2. M. R. Adam, Security-control methods for statistical database: a comparative study, ACM Computing Surveys 21 (4) (1989).
  3. P. P. Griffiths, B. W. Wade, An authorization mechanism for a relational database system, ACM Transactions on Database Systems 1 (3) (September 1976) 242–255.
  4. S. Jajodia, P. Samarati, V. S. Subrahmanian, E. Bertino, A unified framework for enforcing multiple access control policies, Proceedings of ACM SIGMOD International Conference on Management of Data, May 1997, pp. 474–485.
  5. V. Atluri, S. Jajodia, B. George, Multilevel Secure Transaction Processing, Kluwer Academic Publishers, 1999.
  6. D. E. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering SE-13 (February 1987) 222–232.
  7. Teresa Lunt, Catherine McCollum, Intrusion detection and response research at DARPA, Technical Report, The MITRE Corporation, McLean, VA, 1998.
  8. B. Mukherjee, L. T. Habergeon, K. N. Levitt, Network intrusion detection, IEEE Network (June 1994) 26–41.
  9. P. Ammann, S. Jajodia, P. Liu, Recovery from malicious transactions, IEEE Transactions on Knowledge and Data Engineering 15 (5) (2001) 1167–1185.
  10. P. Liu, P. Ammann, S. Jajodia, Rewriting histories: recovery from malicious transactions, Distributed and Parallel Databases 8 (1) (2000) 7–40.
  11. David Lomet, Zografoula Vagena, Roger Barga, Recovery from "bad" user transactions, SIGMOD '06: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, ACM Press, New York, NY, USA, 2006, pp. 337–346.
  12. T. Chiueh, D. Pilania, Design, implementation, and evaluation of a repairable database management system, Proc. Annual Computer Security Applications Conference, 2004.
  13. Yanjun Zuo, Brajendra Panda, Damage Discovery in Distributed Database Systems, 2004, pp. 111–123.
  14. S. P. Shieh, V. D. Gligor, on a pattern-oriented model for intrusion detection, IEEE Transactions on Knowledge and Data Engineering 9 (4) (1997) 661–667.
  15. R. E. Strom, S. Yemini, Optimistic recovery in distributed systems, ACM Transactions on Computer Systems 3 (3) (August 1985) 204–226.
  16. F. Rabitti, E. Bertino,W. Kim, D. Woelk, A model of authorization for next-generation database systems, ACM Transactions on Database Systems 16 (1) (1994) 88–131.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed transaction intrusion patch up database security failure evaluation recovery