R PPR 2
R PPR 2
0976 -S69 7 ]
DOh http1/ /da.do l.w9/1 0,Z4M H/llcw c•.v81 a•
.sn
Volu me 8, No. I, Sep tem ber- Octo ber 2017
€\ lnte mat lona l Joum al of Adv ance d Research In
Com pute r Selene•
RESEARCH PAPER
"'"'0
"···r····
I I I
Recon.rtr11ctlon
Disjoint,wu
~
~ A,N11t•1n ofFNp,•ado 11: •
• Since data is stored close IO the local site of usage,
efficiency and performance of the database system is
Figure I .A reference architecture for DDBS
incnased.
• Local query optimization techniques arc sufficient for
most queries since data i1 locally available. Thus, easy to
2. FRAGMENTATION S\'NOPSIS
manage balanced storage capacity and cost.
• Since irrclcvanl data is nol available at the local sites.
Fragmentation is a design processes that allows dividing
aecurity and privacy of the database 1y1tem can be
• single relation or c:lus of a database into two or more
maintained that increase the reliability.
partitions. Fragmentation must be in such way that the
DIHt#N11t•1n of F,.,,,.,.,.do 11: •
condition of the panitions provides the oriainal databuc
without any loss of data and each fragment can be stored at • In the cue of recursive fragmentations, the job or
reconstruction will need expensive practicet.
any data-site over a computer network of a Distributed
Databue system. • Lack of back-up copies of data in differcnl local lites
FN1•fflMll 011 .... ,. i,,,pr,,w:- may render the dallbue ineffective in the case of failure.
- Reliability • When data &om different &agmenll are required, the
- Security ICCCII speeds may be very high.
- Performance
- Balanced 1tonge capacity and colll J. CONGESTION CONTROL SYNOPSIS
- Communication costs
As we know, 11 the top level of 'reference architecture The demand for more and more information both by
for Distributed Database System' i1 the global schema. The industry and aovcmmeat leads to databases that will exceed
Jlobal schema consilll of the definition of a set of alobal the physical limitatiooa or centralized 1y1tcms. Thus, with
relations. And. each alobal relation can be 1plit into sevenJ the rise of user bued oa Distributed Databue System.
non-overlappina portions which are called hgmentations. traffic congCllion ii one of the unavoidable situations. Even
The mappina between alobal relalions and fnamcnta i1 though several mcan:hcn addrcu the congestion detection
defined in the f'rapnentarion schema. This mappina ii one to technique, ill avoidance ~ mitigation in their racarcb are
many. Fraamcnts are loaical portions or alobal relations. hard to be explored for any eff'ectivc solution for this
Mc:ana, fraptcnll are physically located a& one or ICVCrll problem. Conpon can be outlined u a condition that
sites of the network. And, lhe •llocotiOII «l,nu, definet at happens once the network mourca are overburdened. So
which 1itc(1) • traamcnc is located. At the data procasina raullin~ in such i11ucs is measured by 1011 or data or delay:
level. it i1 required to map lbe physical imaaes to the local Con,auon control 11 • fundamental mechanism u a
DBMS.. This mappin1 is called • local mappina schema troublcsbooter of such problems. Conaation manapment
and depends on the type of local DBMS. So, in a could be reflected u alaorilhm to shire network reaourca
hcteropneoul l)'llem. we haw differcnc types or local amon1 competitiw traffic IOW'Cca. However TCP
mappin1 at different 1ita. con,estion control alprithms can be interprded •
distributed primal4111 alpithms over the lnlcmd to
muimize aarepte utility. Hence, there is a need or lhldia
Tbe dccompolilioa or alobal relatioas into hgmeata can that cxcavatca the loopholes in various approacha 111d
be performed by applyina two different types of lllilll to identify • desip of new conpllion COlllrOI
hp,ca -. (11(2): ledmJque, Coa,atioa IIIIIIIICfflClll mechanisms la loday"I
• Horimalal Frapeataricwl. ucl lntcmct enormously typical to implement Becw. lbe
Internet continuea to expand in size. diversity, 111d reecll.
• Vcnical frllft't aPlliOa
takint put in aa evcr-increaaina role within lbe • . - -
of diff'creal aetworu (lrlalpOrtati on,, finance. etc.). II ii ID
I I,,,
t,c noted that J1stnhuteJ network 5ystem mu~ not be the conse~tton window for e,,ery TCP ,uh-now 1hcrefore on
thought of u •~'<l\:iale uniting of elc,tronic network Sikh•• m1t1g1t1n11hc variety of cnd-1o-cnd r••I 11 1dJre\\C,
h dcay.
the internet. Hence. \\f arc ,o,ng to J,~u...s the r1rt1cul..r both -.'irtd and wireleo nttwork,.
Jistnhutcd network 11>·r-1cm that may he 1JJ1t1onally
cl.t.,~ificJ into a ,cry l.art:c nctv.ork of internet. v.irclcu 5. cu:ST[RISG NF.T\\'ORK ~nr.s
~ensor nct-wurl. and muh1lc ad-hue nctv.·ork. . • "a
First, we must undcntand •hat du,tcrin1 " ·
4. l.lT[RATl"R[ RE\'l[W groupina of rclalcd items stored to1cthc:r fur dfi"cncy of
access and re,ource utilization".
Many stuJ1es ha,c hccn publu,hed on attempts of The raramctcn con,idcred for the propoted chL1tcnn1
1mrro,1n~ the rcrformance of ODDS. These researches technique are described as follows:
ha, e mostly in, estigated fragmentation.. allocation and • Logical Cliut,r C, Lo1ic1I place 1h11 uwd IO sroup
~omcumcs clU5tering problems. In this section, v.·e present network sites together based on some physical property
the main contnbuuons related to Clw.tercd approach lo like di5tancc between them exist.
Congcst1on Control v.1th Fragmentation. • Distrihut,d Networlt SiteJ Set of fully connected nctWork
The authors of (3)14) rrcscnt a new formulation for the sites S., s, , ... s. of distributed dau~ase sy~tei:n, Each
rroblem of fragmentation and allocating those fragments site is the place &om where lhc transaet1ons arc tnuercd.
v.1th minimum cost for both structured and unstructured and transaction results arc held.
data, by ~uping sites which are nearer lo each other into • Distance Range DR The maximum distanee ,·aluc (tn
one clu.-.tcr, hence they ha,·e low cost. Also, a dynamic Km) that is allowed between the DDS nctw~k sites for
clustering method is adopted for both structured and pupina into the umc cluster can be decided by the
un~ttuctuttd database to reduce the movement of data network administrator. Shortest path method is used lo
~-ccn sites. ulculate the distance between two sites.
The complCJtity of a distributed database algorithm • Distance D(S,,S.,) The shortest path distance between two
depends on the allocation method used. Some enhancements sites S, and Si in the DDS. . ·.
have been done in reallocation algorithms. The authors of • Cluster Site Matrix - CSM Calculated malnll by which
(6) proposed an algorithm that reallocates fragments based the clusters arc created and their network sites arc
on the distance between sites to minimize the number of assipcd.
communications and network overhead between sites and • Clustering Decision Yalue - CDY The binary value that
also calculate the cost for each fragment individually. The dctcnnincs whether a pair of sites S, and SJ can be
reallocauon depends on finding the maximum update cost p-ouped together in the same cluster. CDV is calculated
\'Blue for each fragment. This technique takes into account using following fonnula:
the nctWork topology and set of queries &cquency values 1 : ,, D(Si,Sj) S DR AL ._ J
employed over the netWOrk. CDV(Si,Sj) = { 0: ,, D(Si,Sj) > DR VI• J
The authors of [7] present a bio,copphy-bucd II is obvious that CDV for the same site is equal to zero.
optimization technique for no-replicated ~ allocation of If the CDV(S,. SJ) is equal to I, then sites S,. S, arc grouped
data fra,mcnts durin1 database desian tha1 minimize total into the same cluster, otherwise they arc assigned to
data transmission cost durin1 the execution of a set or different clusters. Suppose the seven sites of distnl,Uled
queries. database are placed at some distance (in Km) &om oac
We, now, discuss the mosl iq,ortan1 work dispemcd lo another accordin1 lo the site distance matrix shown in the
addrcu congestion controls in nccworkin&- Scferoglu et al. following table.
(9) hau· conferred (mdinp on TCP-induced packet loua of Table-I·- Site distance matrill
TFRC (TCP Friendly Rate Control) flows and their relation SIN SI sz SJ s, SJ s, S1
•ith the delay umpla and their derivatives as SI 0 70 290 ISO 340 S20 180
collccted'coq,u&cd at TFRC scndcn and receivers. Mao et sz 70 0 640 260 72S 400 S40
al. ( I OJ have developed a hybrid lraffica Aciive Queue SJ 290 640 0 80 60 270 830
Management (AQM) tOUICr with classifier and scheduler
dial make sure die link capacilia of each &raffle. The aulhor
s, ISO 260 80 0 60 SIO 420
SJ 340 72S 60 60 0 3SO 610
has conferred IOIIIC easily verified adequalC stability
conditionl for die AQM policy lo atabiliu the TCP and
s, S20 400 270 SIO 3SO 0 so
UDP queues in routcn- Shianl and Schaar [ 11) have S1 180 S40 830 420 610 so 0
propotcd a cantn-ewarc conpation 1111111,cmenl for
multimedia ,ysccm .aramin1 over TCPnP networks For ICltinl up an efficient clustcrin& mccbod,, ii is
achicvinl hiper than JdB i1■povcmca& ia tcrma of PSNR auumcd that cacb lite ii usiped to only one cluster. ne
over die lrlditianal TCP con,ation COlllrOI approaches. cl111tcrin1 alaoritbm is described u follows:
,,,,,,,,.,,,, ,Wtm,
widt the .,__ a,hanccmenll clilCOVCNd for real-rime
1tra111ina applicaf-GIII requiriDa ripoua playback delays.
,,,,,.,,:
bhmla cl al. (12) ,_. inaoduced a proxy lnnlport layer Site Diltancc Malrix ahowia& distance bet111eaa lilel
prC110CG1 .,...._ Cqrdioe Control Pnleocol (DCCP) DtS..S,)
Dimnceaan,e(DR):
dlll't app•illl for dlllC applicalionl clue IO ica cxcluaive
..,_,,.._ Z11o1111 al. (13) haw prwnted • conpslion Number of IIIWOlt lita or di11rtbuled dllllJIN . , _
(NS)
.,_,.■ ea..:. ......~~.. ~~-~Ml~pach
Tt•P• ~ PtulDCDI) ......,., - ..,--Y .uJIIIII
. . o 1017 H7-.l4l
In C11111pulcr s,·,rnct.111111. Sc-pl c1 • •
, , • " " "11 ,,, 11 'l.1111, A , , 11/, I"" r11~111111:il .lourn:11 nr .\1h 311n·cl kc,1"11rch
Procf'ssm g:
this different vulnerabilities may exist due to heterogeneities
in computational units. .
1•oe1ermining the sires that match the distance range in
order to group them in one cluster-/ We start to address security heterogeneity 1ss~cs by
Slep I: Set i• I dividing a big storage data-site into several data-s11es or
Step 2: Do steps (J-12) until i>NS different type groups. Each data-site type rcpmen ts a leve
st
Step J : Set j• 1 of security vulnerability. In a data-site type group, orage
sites with the same vulnerability share the same weakn~s s
Set 0 to cluster site matrix CSM s' informal lon
that allows attackers to reduce the data-site
Step 4: Dosteps (S-I0)u ntilj>N S
Step S: lfi t j AND D(S" SJ)<• DR, assurance. Although it may be difficult to classify all d~ta-
go to step (6) Else, go to step (7) sites in a system into a large num~ of grou~s, a practi~I
Step 6: Set I to the CSM (Si, Sj), way of identifying data-sites types IS to organize these wilb
go to step 8 similar vulnerabilities into one group. In real-world
Step 7: Set Oto the CSM(S,, S1) distributed systems, the fragmentation technique is usually
Sttp 8: End IF combined with replication to achieve better pcrform a~e at
Step 9: Add I to j the cost of increased security risk to data stored in ~
Step I0: loop systems. A practical distributed system normally contains
Step 11 : Add I to i multiple heterogeneous data-sites providing services. ~th
Step 12: Loop various wlnenbilities. Unfortunately, the elUslmg
Output: Cluster Site Mattix (CSM) having generated fragmentation algorithms do not take the heterogeneity
clusten and their respective network sites issues into accounL Our fragment allocation solution we
End proposed in this paper is a bit different from the existing
Suppose Distance Range (DR) value is 100 Km. After fralJDCnt allocation schemes discussed so far. As in lhe
using the abo\·e clustering algorithm and site distance figure-2, our solution captures heterogeneous features
mattix. a Cluster Site Matrix (CSM) is produced u shown in regarding vulnerabilities of the nodes in order to improve
the following table. the security and congestion control of the data stored in a
Table-2:- Cluster Site matrix (CSMl distributed system.
Sit, SI Sl SJ s,
SJ S1 s, Moreover these aspects, a technique of fragment
allocation and replication at clusters are evaluated accordin g
Cl I I 0 0 0 0 0
0 0 1 I I 0 0 to the performance generated by reducing the size of
C1
0 0 0 0 0 I I fragments that allocated finally at the clusters. The closest
CJ
methods in the literature to the proposed technique of
fragment allocation and replication are those proposed
6. RESEARCH METHODOLOGY
previously by some researchers. The main differences
between these two methods arc described as follows.
We observed several works related to data fragmentation
and their security in Distributed Databue System. In tbia
paper, we find the adaptation of technology chanaea from
relational database to distributed darabuc become too
expensive to use it in cost effective manner and issue of data
security in Disttibuted Database System motivate us to
apply some new to do data fragmentation. Thus, we
proposed the followina technique by which we able to apply
secure and cost effective way for Distnbuccd Databue
System.
su,a ,,,,.,,.,tfPmdn ., a,.,, ,., • ,,,.,,,,,,,.
tioa
As 1CCD above tbal hpncnta be used a base
CID U
for data located oa different aita. Now dmactcristica of
these data can be used for aecurity purpoee. A data CID if
interrupted oa one lite lbcn it needs olbcr related data be
kept oa anotbcr lite bcc8UIC actual meanin1 of it ii 111eleu
unlca lhia partiaJ clara ii aot dnaten. lflbis poaibility ii to
shorten and it ia c:omiclcred dlll only two 1ita are havin1
precioua dala lbcn allo half of lhe data ia miaiq IO dlil ia a
secure method.
----. 1-
o---.e
.,._..
c........
.....
In a larJC scale diltribufed system. diff'Cl'CIII storage sites
have a wriety of wa11 to protect data. The umc security
policy may be iq,lcmmred in varicu mcc:banisms Data Duster Stana•
cacryptioa ICbemcl may wry. eVCD witb the 111DC Sublpte m
cacryptioa ldlemc, by ....... may wry acrou the
Fipre 2.Arcbitecture of Distributed Database S11tem witb
diltnbulcd IJIICIIL Tbe lbow mentioned facton can NCUrt hpnent allocation al cl1111cn due to CODp1tioa.
coaaibulc 10 dift'cral Ylllnmbilitiel UIIODI l&Orap lites.
Ahboup NCUri'1 mocblniaw deployed in Dlhiplc data-
Ifwe co...,_.
witb tbe diff'erclll allocation tec:bniq w
introduced by IOIIII IIIIU'Cben u meatioaed ..
lites caa Ill illlph■•s1 ii • bomopDIO'II way, besides literatun review, OIi' alloc:llioa and "Plic:atioa _..., .
REFERENCES
11 1 h. 011 11 17 7
\ 1' • • 11 ' ' · " ' " •' , , " '· 1111, 111.111011.11 .l,,urn:il nf .\,h l lll"\II kl·,urch In ( ·1111111u1rr ~clrllet. 11 (II), ,rpl CIll 2" ~' ' -.\-'!