0% found this document useful (0 votes)
5 views5 pages

DBMS Unit 5

Uploaded by

kanish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views5 pages

DBMS Unit 5

Uploaded by

kanish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Distributed Database Architecture in DBMS:


Distributed Database System:

A Distributed Database System is a kind of database that is present or divided in more


than one location, which means it is not limited to any single computer system. It is divided
over the network of various systems. The Distributed Database System is physically
present on the different systems in different locations. This can be necessary when
different users from all over the world need to access a specific database. For a user, it
should be handled in such a way that it seems like a single database.

Parameters of Distributed Database Systems:

o Distribution:

It describes how data is physically distributed among the several sites.

o Autonomy:

It reveals the division of power inside the Database System and the degree of autonomy
enjoyed by each individual DBMS.

o Heterogeneity:

It speaks of the similarity or differences between the databases, system parts, and data
models.

o Distribution:

It describes how data is physically distributed among the several sites.

o Autonomy:

It reveals the division of power inside the Database System and the degree of autonomy
enjoyed by each individual DBMS.

o Heterogeneity:

It speaks of the similarity or differences between the databases, system parts, and data
models.
Distributed Data Storage:

There are two methods by which we can store the data on different sites:

o Replication:

This method involves redundantly storing the full relationship at two or more locations.
Since a complete database can be accessed from each site, it becomes a redundant
database. Systems preserve copies of the data as a result of replication.

This has advantages because it makes more data accessible at many locations.
Additionally, query requests can now be handled in parallel.

However, there are some drawbacks as well. Data must be updated frequently. Any
changes performed at one site must be documented at every site where that relation is
stored in order to avoid inconsistent results. There is a tonne of overhead here.
Additionally, since concurrent access must now be monitored across several sites,
concurrency control becomes far more complicated.

o Fragmentation:

According to this method, the relationships are divided (i.e., broken up into smaller
pieces), and each fragment is stored at the many locations where it is needed. To ensure
there is no data loss, the pieces must be created in a way that allows for the reconstruction
of the original relation.

Since Fragmentation doesn't result in duplicate data, consistency is not a concern.

Ways of fragmentation:

o Horizontal Fragmentation:

In Horizontal Fragmentation, the relational table or schema is broken down into a group
of one and more rows, and each row gets one fragment of the schema. It is also
called splitting by rows.

o Vertical Fragmentation:

In this fragmentation, a relational table or schema is divided into some more schemas of
smaller sizes. A common candidate key must be present in each fragment in order to
guarantee a lossless join. This is also called splitting by columns.
Sure! Here are explanations of flow control, encryption with a public key, SQL injection,
and statistical databases in DBMS:

2. Flow Control:

Flow control in database management systems (DBMS) refers to mechanisms and


policies used to ensure the orderly and reliable flow of data between processes,
systems, or network nodes. It encompasses various techniques to manage the pace at
which data is sent and received to prevent data overflow, ensure efficient data
processing, and maintain the integrity of transactions.

Key aspects of flow control include:


- Transaction Control : Managing the execution of database transactions to ensure
ACID (Atomicity, Consistency, Isolation, Durability) properties.
- Concurrency Control : Techniques such as locking and timestamping to manage
simultaneous operations without conflicts.
- Error Handling : Mechanisms to detect, report, and recover from errors during
data transmission or processing.

3. Encryption with Public Key:

Public key encryption, also known as asymmetric encryption, involves using a pair of
keys – a public key and a private key. These keys are mathematically related:

- Public Key : This key is shared openly and can be used by anyone to encrypt a
message.
- Private Key : This key is kept secret by the owner and is used to decrypt
messages encrypted with the corresponding public key.

Process :
1. Encryption : The sender uses the recipient's public key to encrypt the message.
2. Decryption : The recipient uses their private key to decrypt the message.

Public key encryption ensures confidentiality since only the holder of the private key can
decrypt the message encrypted with their public key. It's widely used in securing
communications, digital signatures, and authentication.

4. SQL Injection:

SQL injection is a type of security vulnerability that occurs when an attacker


manipulates a SQL query by inserting (or "injecting") malicious SQL code into an input
field. This can allow the attacker to execute arbitrary SQL commands on the database,
potentially gaining unauthorized access, manipulating data, or compromising the
integrity of the database.
Prevention :
- Use prepared statements with parameterized queries.
- Employ input validation and sanitization.
- Utilize ORM (Object-Relational Mapping) frameworks.
- Implement robust error handling and logging.

5. Statistical Database in DBMS:


A statistical database (SDB) is designed to provide statistical information derived from
the underlying data while protecting the privacy and confidentiality of individual data
records. SDBs are used for statistical analysis and research purposes, allowing users to
query aggregate data such as averages, sums, counts, and other statistical measures.

Key Features :
- Aggregation : Provides aggregate functions and summary statistics.
- Privacy Protection : Implements techniques to prevent inference attacks that could
disclose sensitive individual data from statistical outputs.
- Query Support : Optimized for complex queries that involve statistical
computations.

Privacy Protection Techniques :


- Data Anonymization : Removing or modifying personally identifiable information
(PII).
- Noise Addition : Adding random noise to statistical results to obscure the exact
values.
- Query Restriction : Limiting the types and number of queries to prevent users from
piecing together confidential data.

You might also like