Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/104409
Title: DESIGN OF MULTILEVEL SECURE DATABASE SYSTEM ENABLED WITH EFFICIENT CONCURRENCY CONTROL MECHANISM
Researcher: POOJA
Guide(s): Dr. Suresh Kumar
Keywords: Multilevel Secure Databases, Decomposition, Deadlocks, Secure Query Processing, Concurrency Control.
University: Manav Rachna International University
Completed Date: 23/07/2015
Abstract: Database is a collection of logically related data. A multilevel secure database is similar to traditional databases in structure, but different in the way that in these databases, both the data as well as users are classified to provide security. These classifications are called Access Classes. It is called multilevel, as the security is applied at more than one level. The multilevel relations exist only at logical level. These relations are decomposed into multiple single level relations when they are stored at physical level. To process a query, these single level decomposed relations need to be joined back. For this purpose, various decomposition and recovery algorithms have been proposed. Three models, namely SeaView model, model by Jajodia and Sandhu and the Novel model have been proposed in the literature for decomposition and recovery of multilevel secure databases. These models have been analyzed in detail in terms of number of operations required by each model. It is observed that the Novel decomposition and recovery model is better than the other two models, since it requires a minimum number of operations for decomposition and recovery. newlineFurther, information from a database is accessed using various queries. To process a query, a specific number of internal operations are required based on the architecture of the system. It means as the complexity of system architecture increases, the number of operations required will also increase. So the number of operations required to process a query in centralized system are less as compared to the number of operations required in a distributed environment. The number of operations will increase if multilevel security is added to distributed databases.
Pagination: 
URI: http://hdl.handle.net/10603/104409
Appears in Departments:Department of Computer Science Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File94.91 kBAdobe PDFView/Open
02_certificates.pdf79.25 kBAdobe PDFView/Open
03_acknowledgements.pdf164.82 kBAdobe PDFView/Open
04_contents.pdf90.54 kBAdobe PDFView/Open
05_abstract.pdf164.31 kBAdobe PDFView/Open
06_list of tables figures.pdf113.58 kBAdobe PDFView/Open
07_chapter1.pdf426.56 kBAdobe PDFView/Open
08_chapter2.pdf509.66 kBAdobe PDFView/Open
09_chapter3.pdf224.24 kBAdobe PDFView/Open
10_chapter4.pdf759.63 kBAdobe PDFView/Open
11_chapter5.pdf417.35 kBAdobe PDFView/Open
12_chapter6.pdf432.85 kBAdobe PDFView/Open
13_chpter7.pdf210.95 kBAdobe PDFView/Open
14_chapter8.pdf97.62 kBAdobe PDFView/Open
15_references.pdf277.92 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.