Secure System Model for Replicated DRTDBS

Author(s):  
Pratik Shrivastava ◽  
Udai Shanker

Security in replicated distributed real time database system (RDRTDBS) is still explorative and, despite an increase in real-time applications, many issues and challenges remain in designing a more secure system model. However, very little research has been reported for maintaining security, timeliness, and mutual consistency. This chapter proposes the secure system model for RDRTDBS which secures the system from malicious attack. To prevent the request/response from malicious attack, authors have extended the system model with a cryptographic algorithm. In the cryptographic algorithm, a key must be secretly known only to the sender and receiver. Thus, in this chapter, authors have used the key generation algorithm to generate a key using an image. This secure system model maintains the confidentiality of the replicated data item and preserves its data integrity. It performs better in terms of malicious attack compared to other non-secure system models.

2018 ◽  
Vol 44 (2) ◽  
pp. 35-40
Author(s):  
Tanya jabor ◽  
Hiba Taresh ◽  
Alaa Raheema

All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.


2013 ◽  
Vol 427-429 ◽  
pp. 2110-2113
Author(s):  
Jian Ping Li

This paper analyzed on real-time database system, and applied the cloud manufacturing technology and distributed system technology to the database system model. Through the analysis on the real time database, we can got the distributed real-time data system types and data storage model, establish two kinds of memory T-mode and S-mode, database storage model and make the production of block. Finally establish the work flow of distributed real-time database system, get relevant application program. A large number of real-time data collection and administration can be realized, which can improve the real-time information data processing efficiency and system model performance. Through the establishment of model and analysis of its working process in the real-time distributed system real time database application path, it can provide guidance for the establishment of distributed real-time database system model.


Author(s):  
Gambhir Halse ◽  
Malakappa Shirdhonkar

Research in database management system results in new technology and opportunities to researchers. As a result of this researcher have developed many solutions to real time applications and advancement in hardwares. Database systems with production rules are referred to as active database systems and the field of active database systems has indeed been active. In this article we emphasize on evolution of active database system, its architecture and challenges faced by research community.


1989 ◽  
Author(s):  
Insup Lee ◽  
Susan Davidson ◽  
Victor Wolfe

Author(s):  
Mohsen Ansari ◽  
Amir Yeganeh-Khaksar ◽  
Sepideh Safari ◽  
Alireza Ejlali

Sign in / Sign up

Export Citation Format

Share Document