Potential Covert Channel In Distributed Database

International Journal of Computer Trends and Technology (IJCTT)          
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :Richa Punia , Dr. Sona Malhotra


Richa Punia , Dr. Sona Malhotra "Potential Covert Channel In Distributed Database"International Journal of Computer Trends and Technology (IJCTT),V4(7):2098-2106 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - In today’s Environment. There is need of distributed database in communication. This provides a faster access and remove delays throughout the system .The paper will examine the features of distributed database architecture. The learning of distributed database management system will lead us for successful design. The design will improve scalability ,accessibility and flexibility while accessing data .In distributed System there is conflicts in real time performance and security can be unsolvable .This issue is Improved by allowing database to provide partial security violation so that real time performance is improved such as a covert channel at the time of failure. The main aim is to provide a efficient communication in efficient manner .This design also provide a non blocking communication between different levels. This design will improve a response time and delays throughout the system . In this paper we discuss partial security issues for a DDBMS


[1]Steven P. Coy-"Security Implications of the Choice of Distributed Database Management System Model: Relational vs. Object-Oriented".(2010)
[2] Ghazi Alkhatib-"Transaction Management in Distributed Database Systems: the Case of Oracle’s Two-Phase Commit" Journal of Information Systems Education, Summer (2002)
[3] Sang H. Son and Craig Chaney "Supporting the requirements for multilevel secure and real-time database in distribute environments", pp.136—147(1997).
[4] BhavaniThuraisingham -“Multilevel Security Issues in Distributed Database Management System II"-Computers & Security, 10 (1991) 727-747(2007).
[5] MosesGaruba-"Performance study of a COTS Distributed DBMS adapted for multilevel security" Consultant scientist, U.S. Government, Washington DC, (2004).
[6] Charles P. Pfleeger, Shari Lawrence Pfleeger “Security in Computing”, www.studytemple.com/.../2830-security-computing-charles-p-pfleeger,4th Edition (2008).
[7] T. F. Keefe, W. T. Tsai, and J. Srivastava. “Multilevel Secure Database Concurrency Control,” In Proceedings of the Sixth International Conference on Data Engineering, pp 337-344, Los Angeles, CA, February 1990.
[8] Davidson, M.A. “Security in an Oracle data base environment”. Information Systems Security (2007). .

Keywords : — Distributed database System security, distributed database, distributed database management system, distributed database retrieval problems, discretionary security in distributed database, query processing and multilevel security.