SlideShare a Scribd company logo
1 of 20
UNIT-5
Semantic Data Control
Outlines…
• Introduction of Semantic Data Control
• View Management
• Authentication Control
• Semantic Integrity Control
• Cost of Enforcing Semantic Integrity
1/11/2017 2Prof. Dhaval R. Chandarana
Data Security
• Data security is an important function of a database system that
protects data against unauthorized access.
• Data security includes two aspects: data protection and access
control.
• Data protection is required to prevent unauthorized users from
understanding the physical content of data.
• The main data protection approach is data encryption.
• Access control must be refined so that different users have different
rights on the same database objects.
• There are two main approaches to database access control
discretionary (or authorization control) mandatory or multilevel.
1/11/2017 3Prof. Dhaval R. Chandarana
Discretionary Access Control
• Three main actors are involved in discretionary access control.
1. The subject (e.g., users, groups of users) who trigger the execution
of application programs.
2. Operations, which are embedded in application programs.
3. The database objects, on which the operations are performed.
1/11/2017 4Prof. Dhaval R. Chandarana
Authorization control
• Authorization control consists of checking whether a given triple
(subject, operation, object) can be allowed to proceed.
• The introduction of a subject in the system is typically done by a pair
(user name, password).
• The objects to protect are subsets of the database. Relational systems
provide finer and more general protection granularity than do earlier
systems.
• A right expresses a relationship between a subject and an object for a
particular set of operations.
GRANT <operation type(s)> ON <object> TO <subject(s)>
REVOKE <operation type(s)> FROM <object> TO <subject(s)>
1/11/2017 5Prof. Dhaval R. Chandarana
Multilevel Access Control
• Discretionary access control has some limitations. One problem is
that a malicious user can access unauthorized data through an
authorized user.
• For instance, consider user A who has authorized access to relations R
and S and user B who has authorized access to relation S only. If B
somehow manages to modify an application program used by A so it
writes R data into S, then B can read unauthorized data without
violating authorization rules.
• Multilevel access control answers this problem and further improves
security by defining different security levels for both subjects and
data objects.
1/11/2017 6Prof. Dhaval R. Chandarana
Multilevel Access Control
• process has a security level also called clearance derived from that of the
user.
• In its simplest form, the security levels are Top Secret (TS), Secret (S),
Confidential (C) and Unclassified (U), and ordered as TS > S >C >U, where
“>” means “more secure”.
• Access in read and write modes by subjects is restricted by two simple
rules:
Rule 1 (called “no read up”)
• protects data from unauthorized disclosure, i.e., a subject at a given
security level can only read objects at the same or lower security levels.
Rule 2 (called “no write down”)
• protects data from unauthorized change, i.e., a subject at a given security
level can only write objects at the same or higher security levels.
1/11/2017 7Prof. Dhaval R. Chandarana
Distributed Access Control
• The additional problems of access control in a distributed
environment stem from the fact that objects and subjects are
distributed and that messages with sensitive data can be read by
unauthorized users.
• These problems are: remote user authentication, management of
discretionary access rules, handling of views and of user groups, and
enforcing multilevel access control.
• Remote user authentication is necessary since any site of a
distributed DBMS may accept programs initiated, and authorized, at
remote sites.
1/11/2017 8Prof. Dhaval R. Chandarana
Distributed Access Control
• Three solutions are possible for managing authentication
1. Authentication information is maintained at a central site for global
users which can then be authenticated only once and then accessed
from multiple sites.
2. The information for authenticating users (user name and password)
is replicated at all sites in the catalog.
3. Intersite communication is thus protected by the use of the site
password. Once the initiating site has been authenticated, there is
no need for authenticating their remote users.
1/11/2017 9Prof. Dhaval R. Chandarana
Semantic Integrity Control
• Another important and difficult problem for a database system is how
to guarantee database consistency.
• A database state is said to be consistent if the database satisfies a set
of constraints, called semantic integrity constraints.
• Maintaining a consistent database requires various mechanisms such
as concurrency control, reliability, protection, and semantic integrity
control, which are provided as part of transaction management.
• Semantic integrity control ensures database consistency by rejecting
update transactions that lead to inconsistent database states, or by
activating specific actions on the database state, which compensate
for the effects of the update transactions.
1/11/2017 10Prof. Dhaval R. Chandarana
Semantic Integrity Control
• Two main types of integrity constraints can be distinguished:
structural constraints and behavioral constraints.
• Structural constraints express basic semantic properties inherent to a
model. Examples of such constraints are unique key constraints in the
relational model, or one-to-many associations between objects in the
object-oriented model.
• Behavioral constraints are essential in the database design process.
They can express associations between objects, such as inclusion
dependency in the relational model, or describe object properties
and structures.
1/11/2017 11Prof. Dhaval R. Chandarana
Centralized Semantic Integrity Control
• Specification of Integrity Constraints
• triggers (event-condition-action rules) can be used to automatically
propagate updates, and thus to maintain semantic integrity.
• We can distinguish between three types of integrity constraints:
predefined, precondition, or general constraints.
• EMP(ENO, ENAME, TITLE)
• PROJ(PNO, PNAME, BUDGET)
• ASG(ENO, PNO, RESP, DUR)
1/11/2017 12Prof. Dhaval R. Chandarana
Centralized Semantic Integrity Control
• Predefined constraints are based on simple keywords. Through them,
it is possible to express concisely the more common constraints of the
relational model, such as non-null attribute, unique key, foreign key,
or functional dependency.
• Employee number in relation EMP cannot be null.
ENO NOT NULL IN EMP
• The project number PNO in relation ASG is a foreign key matching the
primary key PNO of relation PROJ.
PNO IN ASG REFERENCES PNO IN PROJ
1/11/2017 13Prof. Dhaval R. Chandarana
Centralized Semantic Integrity Control
• Precondition constraints express conditions that must be satisfied by all
tuples in a relation for a given update type. The update type, which might
be INSERT, DELETE, or MODIFY, permits restricting the integrity control.
• Precondition constraints can be expressed with the SQL CHECK statement
enriched with the ability to specify the update type.
CHECK ON <relation name > WHEN <update type>
(<qualification over relation name>)
• The budget of a project is between 500K and 1000K.
CHECK ON PROJ (BUDGET+ >= 500000 AND BUDGET <= 1000000)
• Only the tuples whose budget is 0 may be deleted.
CHECK ON PROJ WHEN DELETE (BUDGET = 0)
1/11/2017 14Prof. Dhaval R. Chandarana
Centralized Semantic Integrity Control
• General constraints are formulas of tuple relational calculus where all
variables are quantified. The database system must ensure that those
formulas are always true.
CHECK ON list of <variable name>:<relation name>,(<qualification>)
• The total duration for all employees in the CAD project is less than
100.
• CHECK ON g:ASG, j:PROJ (SUM(g.DUR WHERE g.PNO=j.PNO)<100 IF
j.PNAME="CAD/CAM")
1/11/2017 15Prof. Dhaval R. Chandarana
Distributed Semantic Integrity Control
• Definition of Distributed Integrity Constraints
• Assertions can involve data stored at different sites, the storage of the
constraints must be decided so as to minimize the cost of integrity
checking. There is a strategy based on a taxonomy of integrity constraints
that distinguishes three classes:
• Individual constraints: single-relation single-variable constraints. They
refer only to tuples to be updated independently of the rest of the
database.
• Set-oriented constraints: include single-relation multivariable constraints
such as functional dependency and multirelation multivariable constraints
such as foreign key constraints
• Constraints involving aggregates: require special processing because of the
cost of evaluating the aggregates.
1/11/2017 16Prof. Dhaval R. Chandarana
Individual constraints
• Consider relation EMP, horizontally fragmented across three sites
using the predicates and the domain constraint C: ENO < “E4”.
 p1 : 0 ENO < “E3”
 p2 : ”E3” ENO “E6”
 p3 : ENO > “E6”
• Constraint C is compatible with p1 (if C is true, p1 is true) and p2 (if C
is true, p2 is not necessarily false), but not with p3 (if C is true, then
p3 is false). Therefore, constraint C should be globally rejected
because the tuples at site 3 cannot satisfy C, and thus relation EMP
does not satisfy C.
1/11/2017 17Prof. Dhaval R. Chandarana
Set-oriented constraints.
• Set-oriented constraint are multivariable; that is, they involve join
predicates.
• Three cases, given in increasing cost of checking, can occur:
1. The fragmentation of R is derived from that of S based on a semi
join on the attribute used in the assertion join predicate.
2. S is fragmented on join attribute.
3. S is not fragmented on join attribute.
1/11/2017 18Prof. Dhaval R. Chandarana
Set-oriented constraints.
• In the first case, compatibility checking is cheap since the tuple of S
matching a tuple of R is at the same site.
• In the second case, each tuple of R must be compared with at most
one fragment of S, because the join attribute value of the tuple of R
can be used to find the site of the corresponding fragment of S.
• In the third case, each tuple of R must be compared with all
fragments of S. If compatibility is found for all tuples of R, the
constraint can be stored at each site.
1/11/2017 19Prof. Dhaval R. Chandarana
Constraints involving aggregates
• These constraints are among the most costly to test because they
require the calculation of the aggregate functions.
• The aggregate functions generally manipulated are MIN, MAX, SUM,
and COUNT.
• Each aggregate function contains a projection part and a selection
part.
1/11/2017 20Prof. Dhaval R. Chandarana

More Related Content

What's hot

Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Meghaj Mallick
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency controlBinte fatima
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database SystemMeghaj Mallick
 
Load Balancing in Parallel and Distributed Database
Load Balancing in Parallel and Distributed DatabaseLoad Balancing in Parallel and Distributed Database
Load Balancing in Parallel and Distributed DatabaseMd. Shamsur Rahim
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency controlDhani Ahmad
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating SystemsRitu Ranjan Shrivastwa
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Gyanmanjari Institute Of Technology
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database SystemSulemang
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
Overview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesOverview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesMeghaj Mallick
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 ReliabilityAli Usman
 

What's hot (20)

Distributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - IntroductionDistributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - Introduction
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency control
 
Query processing in Distributed Database System
Query processing in Distributed Database SystemQuery processing in Distributed Database System
Query processing in Distributed Database System
 
Load Balancing in Parallel and Distributed Database
Load Balancing in Parallel and Distributed DatabaseLoad Balancing in Parallel and Distributed Database
Load Balancing in Parallel and Distributed Database
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating Systems
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Parallel Database
Parallel DatabaseParallel Database
Parallel Database
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database System
 
Distributed Transaction
Distributed TransactionDistributed Transaction
Distributed Transaction
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Overview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed DatabasesOverview of Concurrency Control & Recovery in Distributed Databases
Overview of Concurrency Control & Recovery in Distributed Databases
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 

Viewers also liked

16. Concurrency Control in DBMS
16. Concurrency Control in DBMS16. Concurrency Control in DBMS
16. Concurrency Control in DBMSkoolkampus
 
Databases: Concurrency Control
Databases: Concurrency ControlDatabases: Concurrency Control
Databases: Concurrency ControlDamian T. Gordon
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01ctedds
 
Transaction & Concurrency Control
Transaction & Concurrency ControlTransaction & Concurrency Control
Transaction & Concurrency ControlRavimuthurajan
 
Transaction concurrency control
Transaction concurrency controlTransaction concurrency control
Transaction concurrency controlAnand Grewal
 
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Beat Signer
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemuday sharma
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems greg robertson
 

Viewers also liked (11)

Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
16. Concurrency Control in DBMS
16. Concurrency Control in DBMS16. Concurrency Control in DBMS
16. Concurrency Control in DBMS
 
Databases: Concurrency Control
Databases: Concurrency ControlDatabases: Concurrency Control
Databases: Concurrency Control
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
Transaction & Concurrency Control
Transaction & Concurrency ControlTransaction & Concurrency Control
Transaction & Concurrency Control
 
Transaction concurrency control
Transaction concurrency controlTransaction concurrency control
Transaction concurrency control
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
 
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
Transaction Management - Lecture 11 - Introduction to Databases (1007156ANR)
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
 

Similar to Distributed DBMS - Unit 5 - Semantic Data Control

A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1VivekKrishna34
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxMEGHANA508383
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Adbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachAdbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachVaibhav Khanna
 
Database Testing: A Detailed Guide
Database Testing: A Detailed GuideDatabase Testing: A Detailed Guide
Database Testing: A Detailed GuideEnov8
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisDr Geetha Mohan
 
Presentation on Database management system
Presentation on Database management systemPresentation on Database management system
Presentation on Database management systemPrerana Bhattarai
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemEddyzulham Mahluzydde
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptxaryan631999
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computingeShikshak
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Vijayananda Ratnam Ch
 
DBMS architecture &; system structure
DBMS architecture &; system  structureDBMS architecture &; system  structure
DBMS architecture &; system structureRUpaliLohar
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
Characteristic of dabase approach
Characteristic of dabase approachCharacteristic of dabase approach
Characteristic of dabase approachLuina Pani
 

Similar to Distributed DBMS - Unit 5 - Semantic Data Control (20)

unit 1.pdf
unit 1.pdfunit 1.pdf
unit 1.pdf
 
A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1A Deep Dive into RESTful API Design Part 1
A Deep Dive into RESTful API Design Part 1
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Adbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approachAdbms 3 main characteristics of the database approach
Adbms 3 main characteristics of the database approach
 
Database Testing: A Detailed Guide
Database Testing: A Detailed GuideDatabase Testing: A Detailed Guide
Database Testing: A Detailed Guide
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
Presentation on Database management system
Presentation on Database management systemPresentation on Database management system
Presentation on Database management system
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
 
SE Unit 2(1).pptx
SE Unit 2(1).pptxSE Unit 2(1).pptx
SE Unit 2(1).pptx
 
Chapeter 2 introduction to cloud computing
Chapeter 2   introduction to cloud computingChapeter 2   introduction to cloud computing
Chapeter 2 introduction to cloud computing
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)Introduction to Database Management Systems (DBMS)
Introduction to Database Management Systems (DBMS)
 
DBMS architecture &; system structure
DBMS architecture &; system  structureDBMS architecture &; system  structure
DBMS architecture &; system structure
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Characteristic of dabase approach
Characteristic of dabase approachCharacteristic of dabase approach
Characteristic of dabase approach
 

More from Gyanmanjari Institute Of Technology

More from Gyanmanjari Institute Of Technology (20)

WD - Unit - 7 - Advanced Concepts
WD - Unit - 7 - Advanced ConceptsWD - Unit - 7 - Advanced Concepts
WD - Unit - 7 - Advanced Concepts
 
WD - Unit - 4 - PHP Basics
WD - Unit - 4 - PHP BasicsWD - Unit - 4 - PHP Basics
WD - Unit - 4 - PHP Basics
 
WD - Unit - 3 - Java Script
WD - Unit - 3 - Java ScriptWD - Unit - 3 - Java Script
WD - Unit - 3 - Java Script
 
WD - Unit - 6 - Database Connectivity using PHP
WD - Unit - 6 - Database Connectivity using PHPWD - Unit - 6 - Database Connectivity using PHP
WD - Unit - 6 - Database Connectivity using PHP
 
WD - Unit - 5 - Session and State Management using PHP
WD - Unit - 5 - Session and State Management using PHPWD - Unit - 5 - Session and State Management using PHP
WD - Unit - 5 - Session and State Management using PHP
 
WD - Unit - 2 - HTML & CSS
WD - Unit - 2 - HTML & CSSWD - Unit - 2 - HTML & CSS
WD - Unit - 2 - HTML & CSS
 
WD - Unit - 1 - Introduction
WD - Unit - 1 - IntroductionWD - Unit - 1 - Introduction
WD - Unit - 1 - Introduction
 
OSV - Unit - 8 - Unix/Linux Operating System
OSV - Unit - 8 - Unix/Linux Operating SystemOSV - Unit - 8 - Unix/Linux Operating System
OSV - Unit - 8 - Unix/Linux Operating System
 
OSV - Unit - 10 - Approaches to Virtualization
OSV - Unit - 10 - Approaches to VirtualizationOSV - Unit - 10 - Approaches to Virtualization
OSV - Unit - 10 - Approaches to Virtualization
 
OSV - Unit - 9 - Virtualization Concepts
OSV - Unit - 9 - Virtualization ConceptsOSV - Unit - 9 - Virtualization Concepts
OSV - Unit - 9 - Virtualization Concepts
 
OSV - Unit - 7 - I/O Management & Disk scheduling
OSV - Unit - 7 - I/O Management & Disk schedulingOSV - Unit - 7 - I/O Management & Disk scheduling
OSV - Unit - 7 - I/O Management & Disk scheduling
 
OSV - Unit - 6 - Memory Management
OSV - Unit - 6 - Memory ManagementOSV - Unit - 6 - Memory Management
OSV - Unit - 6 - Memory Management
 
CNS - Unit - 10 - Web Security Threats and Approaches
CNS - Unit - 10 - Web Security Threats and ApproachesCNS - Unit - 10 - Web Security Threats and Approaches
CNS - Unit - 10 - Web Security Threats and Approaches
 
OSV - Unit - 5 - Deadlock
OSV - Unit - 5 - DeadlockOSV - Unit - 5 - Deadlock
OSV - Unit - 5 - Deadlock
 
OSV - Unit - 4 - Inter Process Communication
OSV - Unit - 4 - Inter Process CommunicationOSV - Unit - 4 - Inter Process Communication
OSV - Unit - 4 - Inter Process Communication
 
OSV - Unit - 3 - Concurrency
OSV - Unit - 3 - ConcurrencyOSV - Unit - 3 - Concurrency
OSV - Unit - 3 - Concurrency
 
OSV - Unit - 2 - Process and Threads Management
OSV - Unit - 2 - Process and Threads ManagementOSV - Unit - 2 - Process and Threads Management
OSV - Unit - 2 - Process and Threads Management
 
CNS - Unit - 8 - Key Management and Distribution
CNS - Unit - 8 - Key Management and DistributionCNS - Unit - 8 - Key Management and Distribution
CNS - Unit - 8 - Key Management and Distribution
 
CNS - Unit - 7 - Digital Signature
CNS - Unit - 7 - Digital SignatureCNS - Unit - 7 - Digital Signature
CNS - Unit - 7 - Digital Signature
 
CNS - Unit - 6 - Message Authentication Code
CNS - Unit - 6 - Message Authentication CodeCNS - Unit - 6 - Message Authentication Code
CNS - Unit - 6 - Message Authentication Code
 

Recently uploaded

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 

Distributed DBMS - Unit 5 - Semantic Data Control

  • 2. Outlines… • Introduction of Semantic Data Control • View Management • Authentication Control • Semantic Integrity Control • Cost of Enforcing Semantic Integrity 1/11/2017 2Prof. Dhaval R. Chandarana
  • 3. Data Security • Data security is an important function of a database system that protects data against unauthorized access. • Data security includes two aspects: data protection and access control. • Data protection is required to prevent unauthorized users from understanding the physical content of data. • The main data protection approach is data encryption. • Access control must be refined so that different users have different rights on the same database objects. • There are two main approaches to database access control discretionary (or authorization control) mandatory or multilevel. 1/11/2017 3Prof. Dhaval R. Chandarana
  • 4. Discretionary Access Control • Three main actors are involved in discretionary access control. 1. The subject (e.g., users, groups of users) who trigger the execution of application programs. 2. Operations, which are embedded in application programs. 3. The database objects, on which the operations are performed. 1/11/2017 4Prof. Dhaval R. Chandarana
  • 5. Authorization control • Authorization control consists of checking whether a given triple (subject, operation, object) can be allowed to proceed. • The introduction of a subject in the system is typically done by a pair (user name, password). • The objects to protect are subsets of the database. Relational systems provide finer and more general protection granularity than do earlier systems. • A right expresses a relationship between a subject and an object for a particular set of operations. GRANT <operation type(s)> ON <object> TO <subject(s)> REVOKE <operation type(s)> FROM <object> TO <subject(s)> 1/11/2017 5Prof. Dhaval R. Chandarana
  • 6. Multilevel Access Control • Discretionary access control has some limitations. One problem is that a malicious user can access unauthorized data through an authorized user. • For instance, consider user A who has authorized access to relations R and S and user B who has authorized access to relation S only. If B somehow manages to modify an application program used by A so it writes R data into S, then B can read unauthorized data without violating authorization rules. • Multilevel access control answers this problem and further improves security by defining different security levels for both subjects and data objects. 1/11/2017 6Prof. Dhaval R. Chandarana
  • 7. Multilevel Access Control • process has a security level also called clearance derived from that of the user. • In its simplest form, the security levels are Top Secret (TS), Secret (S), Confidential (C) and Unclassified (U), and ordered as TS > S >C >U, where “>” means “more secure”. • Access in read and write modes by subjects is restricted by two simple rules: Rule 1 (called “no read up”) • protects data from unauthorized disclosure, i.e., a subject at a given security level can only read objects at the same or lower security levels. Rule 2 (called “no write down”) • protects data from unauthorized change, i.e., a subject at a given security level can only write objects at the same or higher security levels. 1/11/2017 7Prof. Dhaval R. Chandarana
  • 8. Distributed Access Control • The additional problems of access control in a distributed environment stem from the fact that objects and subjects are distributed and that messages with sensitive data can be read by unauthorized users. • These problems are: remote user authentication, management of discretionary access rules, handling of views and of user groups, and enforcing multilevel access control. • Remote user authentication is necessary since any site of a distributed DBMS may accept programs initiated, and authorized, at remote sites. 1/11/2017 8Prof. Dhaval R. Chandarana
  • 9. Distributed Access Control • Three solutions are possible for managing authentication 1. Authentication information is maintained at a central site for global users which can then be authenticated only once and then accessed from multiple sites. 2. The information for authenticating users (user name and password) is replicated at all sites in the catalog. 3. Intersite communication is thus protected by the use of the site password. Once the initiating site has been authenticated, there is no need for authenticating their remote users. 1/11/2017 9Prof. Dhaval R. Chandarana
  • 10. Semantic Integrity Control • Another important and difficult problem for a database system is how to guarantee database consistency. • A database state is said to be consistent if the database satisfies a set of constraints, called semantic integrity constraints. • Maintaining a consistent database requires various mechanisms such as concurrency control, reliability, protection, and semantic integrity control, which are provided as part of transaction management. • Semantic integrity control ensures database consistency by rejecting update transactions that lead to inconsistent database states, or by activating specific actions on the database state, which compensate for the effects of the update transactions. 1/11/2017 10Prof. Dhaval R. Chandarana
  • 11. Semantic Integrity Control • Two main types of integrity constraints can be distinguished: structural constraints and behavioral constraints. • Structural constraints express basic semantic properties inherent to a model. Examples of such constraints are unique key constraints in the relational model, or one-to-many associations between objects in the object-oriented model. • Behavioral constraints are essential in the database design process. They can express associations between objects, such as inclusion dependency in the relational model, or describe object properties and structures. 1/11/2017 11Prof. Dhaval R. Chandarana
  • 12. Centralized Semantic Integrity Control • Specification of Integrity Constraints • triggers (event-condition-action rules) can be used to automatically propagate updates, and thus to maintain semantic integrity. • We can distinguish between three types of integrity constraints: predefined, precondition, or general constraints. • EMP(ENO, ENAME, TITLE) • PROJ(PNO, PNAME, BUDGET) • ASG(ENO, PNO, RESP, DUR) 1/11/2017 12Prof. Dhaval R. Chandarana
  • 13. Centralized Semantic Integrity Control • Predefined constraints are based on simple keywords. Through them, it is possible to express concisely the more common constraints of the relational model, such as non-null attribute, unique key, foreign key, or functional dependency. • Employee number in relation EMP cannot be null. ENO NOT NULL IN EMP • The project number PNO in relation ASG is a foreign key matching the primary key PNO of relation PROJ. PNO IN ASG REFERENCES PNO IN PROJ 1/11/2017 13Prof. Dhaval R. Chandarana
  • 14. Centralized Semantic Integrity Control • Precondition constraints express conditions that must be satisfied by all tuples in a relation for a given update type. The update type, which might be INSERT, DELETE, or MODIFY, permits restricting the integrity control. • Precondition constraints can be expressed with the SQL CHECK statement enriched with the ability to specify the update type. CHECK ON <relation name > WHEN <update type> (<qualification over relation name>) • The budget of a project is between 500K and 1000K. CHECK ON PROJ (BUDGET+ >= 500000 AND BUDGET <= 1000000) • Only the tuples whose budget is 0 may be deleted. CHECK ON PROJ WHEN DELETE (BUDGET = 0) 1/11/2017 14Prof. Dhaval R. Chandarana
  • 15. Centralized Semantic Integrity Control • General constraints are formulas of tuple relational calculus where all variables are quantified. The database system must ensure that those formulas are always true. CHECK ON list of <variable name>:<relation name>,(<qualification>) • The total duration for all employees in the CAD project is less than 100. • CHECK ON g:ASG, j:PROJ (SUM(g.DUR WHERE g.PNO=j.PNO)<100 IF j.PNAME="CAD/CAM") 1/11/2017 15Prof. Dhaval R. Chandarana
  • 16. Distributed Semantic Integrity Control • Definition of Distributed Integrity Constraints • Assertions can involve data stored at different sites, the storage of the constraints must be decided so as to minimize the cost of integrity checking. There is a strategy based on a taxonomy of integrity constraints that distinguishes three classes: • Individual constraints: single-relation single-variable constraints. They refer only to tuples to be updated independently of the rest of the database. • Set-oriented constraints: include single-relation multivariable constraints such as functional dependency and multirelation multivariable constraints such as foreign key constraints • Constraints involving aggregates: require special processing because of the cost of evaluating the aggregates. 1/11/2017 16Prof. Dhaval R. Chandarana
  • 17. Individual constraints • Consider relation EMP, horizontally fragmented across three sites using the predicates and the domain constraint C: ENO < “E4”.  p1 : 0 ENO < “E3”  p2 : ”E3” ENO “E6”  p3 : ENO > “E6” • Constraint C is compatible with p1 (if C is true, p1 is true) and p2 (if C is true, p2 is not necessarily false), but not with p3 (if C is true, then p3 is false). Therefore, constraint C should be globally rejected because the tuples at site 3 cannot satisfy C, and thus relation EMP does not satisfy C. 1/11/2017 17Prof. Dhaval R. Chandarana
  • 18. Set-oriented constraints. • Set-oriented constraint are multivariable; that is, they involve join predicates. • Three cases, given in increasing cost of checking, can occur: 1. The fragmentation of R is derived from that of S based on a semi join on the attribute used in the assertion join predicate. 2. S is fragmented on join attribute. 3. S is not fragmented on join attribute. 1/11/2017 18Prof. Dhaval R. Chandarana
  • 19. Set-oriented constraints. • In the first case, compatibility checking is cheap since the tuple of S matching a tuple of R is at the same site. • In the second case, each tuple of R must be compared with at most one fragment of S, because the join attribute value of the tuple of R can be used to find the site of the corresponding fragment of S. • In the third case, each tuple of R must be compared with all fragments of S. If compatibility is found for all tuples of R, the constraint can be stored at each site. 1/11/2017 19Prof. Dhaval R. Chandarana
  • 20. Constraints involving aggregates • These constraints are among the most costly to test because they require the calculation of the aggregate functions. • The aggregate functions generally manipulated are MIN, MAX, SUM, and COUNT. • Each aggregate function contains a projection part and a selection part. 1/11/2017 20Prof. Dhaval R. Chandarana