Content area
Full text
Abstract: This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system.
In this paper, we propose some solution for some security aspects such as multi-level access control, confidentiality, reliability, integrity and recovery that pertain to a distributed database system.
Keywords: - Distributed database management system, distributed database security, distributed database architecture, distributed database retrieval problems, Concurrency control.
I. Introduction
A Distributed [1] database is a collection of databases which are distributed and then stored on multiple computers (otherwise called sites) within a network. All sites participating in the distributed database enjoy local autonomy in the sense that the database at each site has full control over itself in terms of managing the data. Also the sites can inter-operate whenever required.
A database [2] link connection allows local users to access data on a remote database for establishing these connections, each database in the distributed system must have a unique global database name in the network domain. The global database name uniquely identifies a database server in a distributed system. Which means users have access to the database at their location so, that they can access the data relevant to their task without interfering with the work of others?
The Distributed database management system (DDBMS) is software that permits the management of the distributed database and makes the distribution transparent to the user. The main difference between centralized and distributed database is that the distributed databases are typically geographically separated and are separately administrated between local & global transactions. A local transaction is one that access data only from sites where the transaction originated , A global transaction on the other hand is one that either access data in a site different from the one at which the transaction was initiated or, accessed data in several different site .
In this paper we will review the security concern of databases and distributed databases in particular. The security problems found in both models will be examined. Moreover, we will...




