SAIC Logo
Georgia Tech College of Computing Logo

Security in Distributed Databases

A distributed database system is a collection of mutually independent centralized database systems (in which data is logically related to each other) designed to share data amongst themselves via a communication channel using some predefined technique. The aim is to give efficient access to data. But certain applications require that this access be limited due to security or privacy reasons. In case of distributed databases security threats and vulnerabilities of a centralized database system apply and beside that there are additional issues because of the communication link and dispersed nature of users and data. A number of techniques already exist that protect the database & data while in transit (like encryption) but a robust technique is required. The primary issue in database security is access control. The system wide security policy does not apply in case of a distributed scenario due to the heterogeneous characteristics. Thus an access control model in which the user can decide which data is secure could be employed. Alternatively we could decide the security of data based on semantics. Other issues include validation of users, availability of the data at all times and inventory ability to track access to data. Our goal here would be to understand the current issues and security techniques used for distributed databases and improvise them. The motivation behind doing this topic is the widespread reliance of firms on database systems and current developments in distributed and mobile computing applications.

References:

R. Elmsari and S. B. Navathe, “Fundamentals of Database Systems” Pearson Publication 2004.

A. Silberschatz, H. F. Korth, S. Sudarshan, “Database System Concepts” Mc Graw Hill Publication 2002.

C. Pfleeger, S. L. Pfleeger, “Security in Computing”, Pearson Publication 2003 Chapter 6 Database and Data Mining Security.

James A. Larson, “A Flexible Reference Architecture for Distributed Database Management” Proceedings of the 1985 ACM Computer Science Conference James A. Larson [ A paper in a conference]

Iliya K. Georgiev Ivo I. Georgiev, “A Security Model for Distributed Computing” CCSC: Rocky Mountain Conference. [A paper in a conference]

Wm Wulf, Chenxi Wang, Darrell Keinzle “A New Model of Security for distributed systems” 1996 ACM New Security Paradigm Worskshop Lake Arrowhead, CA, USA. [A paper in a Workshop.]