Security Management for Distributed Environment
نویسندگان
چکیده
–A mobile database is a database that can be connected to by a mobile computing device over a mobile network. Mobile processed information in database systems is distributed, heterogeneous, and replicated. They are endangered by various threats based on user’s mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standard protection mechanisms do not work very well in such environments. So our proposed model enhances the security in mobile database system. In this paper we develop a security model for transaction management framework for peer-to-peer environments. If any attack still occurs on a database system, evaluation of damage must be performed as soon the attack is identified. The attack recovery problem has two aspects: damage assessment and damage repair. The complexity of attack recovery is mainly caused by a phenomenon called damage spreading. This paper focuses on damage assessment and recovery procedure for distributed database systems. Keywords––Mobile Database, Transaction Management, Security
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملSecurity Constraint Processing in a Multilevel Secure Distributed Database Management System
In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification p...
متن کاملA Cooperative Model for IS Security Risk Management in Distributed Environment
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security informati...
متن کاملOn Secure Workflow Decentralisation on the Internet
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system’s overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are prese...
متن کامل