International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJCTT-V4I7P123 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I7P123

Potential Covert Channel In Distributed Database


Richa Punia , Dr. Sona Malhotra

Citation :

Richa Punia , Dr. Sona Malhotra, "Potential Covert Channel In Distributed Database," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 7, pp. 2098-2106, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I7P123

Abstract

In today’s Environment. There is need of distributed database in communication. This provides a faster access and remove delays throughout the system .The paper will examine the features of distributed database architecture. The learning of distributed database management system will lead us for successful design. The design will improve scalability ,accessibility and flexibility while accessing data .In distributed System there is conflicts in real time performance and security can be unsolvable .This issue is Improved by allowing database to provide partial security violation so that real time performance is improved such as a covert channel at the time of failure. The main aim is to provide a efficient communication in efficient manner .This design also provide a non blocking communication between different levels. This design will improve a response time and delays throughout the system . In this paper we discuss partial security issues for a DDBMS

Keywords

Distributed database System security, distributed database, distributed database management system, distributed database retrieval problems, discretionary security in distributed database, query processing and multilevel security.

References

[1] Steven P. Coy-"Security Implications of the Choice of Distributed Database Management System Model: Relational vs. Object-Oriented".(2010)
[ 2] Ghazi Alkhatib-"Transaction Management in Distributed Database Systems: the Case of Oracle’s Two-Phase Commit" Journal of Information Systems Education, Summer (2002)
[3] Sang H. Son and Craig Chaney "Supporting the requirements for multilevel secure and real-time database in distribute environments", pp.136— 147(1997).
[4] Bhavani Thuraisingham -“Multilevel Security Issues in Distributed Database Management System II"-Computers & Security, 10 (1991) 727-747(2007).
[5]  Moses Garuba-"Performance study of a COTS Distributed DBMS adapted for multilevel security" Consultant scientist, U.S. Government, Washington DC, (2004).
[6] Charles P. Pfleeger, Shari Lawrence Pfleeger “Security in Computing”, www.studytemple.com/.../2830-security-computingcharles-p-pfleeger,4th Edition (2008). 
[7] T. F. Keefe, W. T. Tsai, and J. Srivastava. “Multilevel Secure Database Concurrency Control,” In Proceedings of the Sixth International Conference on Data Engineering, pp 337-344, Los Angeles, CA, February 1990.
[8] Davidson, M.A. “Security in an Oracle data base environment”. Information Systems Security (2007).
[9] P. C. Clements, C. L. Heitmeyer, B. G. Labaw, and A. T. Rose. “MT: A Toolset for Specifying and Analyzing Real-Time Systems,” Real-Time System Symposium, Lake Buena Vista, FL, December 1990.
[10] D. E. Bell and L. J. LaPadula. “Secure Computer Systems: Unified Exposition Multics Interpretation,” The Mitre Corp., March 1976. and
[11]Newman, “A. Database Security Best Practices Security”. Retrieved April 1, 2007 from Business Source Premier database. Palmquist, M., Busch, C., De Maret, P., Flynn, T., Kellum, R., Le, S., Meyers, B., (2005).
[12] Andre N. Fredette and Rance Cleveland. “RTSL: A Language for Real-Time Schedulability Analysis,” Real-Time System Symposium, Raleigh-Durham, NC, December 1993.
[13] Luftman, J., Managing the Information Technology Resource: Leadership in the Information Age. Upper Saddle River, NJ. Pearson Education, Inc. (2004).
[14] Millen R.Jagannathan, /Lunt, C.Jalali, H.Javitz, “Security A.Tamaru, F.Gilham, P.Neumann for and Object-Oriented Database “,IT-security and privacy-design and use of privacy”-enhancing  (1992)
[15] Thuraisingham, B. “Database and Applications Security: Integrating Informations Security and Data Management”. Boca Raton, FL: Auerbach Publications (2005).
[16] Dutta, A. and McCrohan, K. (2002). Management’s Role in Information Security in a Cyber Economy. California Management Review (2007) .