121,622 research outputs found

    SQL Tools and Optimization

    Get PDF
    Query optimization gives the good performance of the system and manages heavy workload on the database when transmission on data occurs and the effective usage of database engine and lesser memory consumed. For better performance we need to use best, faster and well-ordered queries. Since we need SQL query tuning based on the customer requirements. Firstly the data in database is optimized and then query. In this paper we propose database watermarking technique which is an effective method for database security. To improve query response time is to reduce the number of disk Inputs/Outputs by partitioning the database vertically and/or horizontally which we achieve using clustering. We present a technique for structured database decomposition based on the relational data

    SafeRegions: performance evaluation of multi-party protocols on HBase

    Get PDF
    On-line applications and services are now a critical part of our everyday life. Using these services typically requires us to trust our personal or company's information to a large number of third-party entities. These entities enforce several security measures to avoid unauthorized accesses but data is still stored on common database systems that are designed without data privacy concerns in mind. As a result, data is vulnerable against anyone with direct access to the database, which may be external attackers, malicious insiders, spies or even subpoenas. Building strong data privacy mechanisms on top of common database systems is possible but has a significant impact on the system's resources, computational capabilities and performance. Notably, the amount of useful computation that may be done over strongly encrypted data is close to none, which defeats the purpose of offloading computation to third-party services. In this paper, we propose to shift the need to trust in the honesty and security of service providers to simply trust that they will not collude. This is reasonable as cloud providers, being competitors, do not share data among themselves. We focus on NoSQL databases and present SafeRegions, a novel prototype of a distributed and secure NoSQL database that is built on top of HBase and that guarantees strong data privacy while still providing most of HBase's query capabilities. SafeRegions relies on secret sharing and multiparty computation techniques to provide a NoSQL database built on top of multiple, non-colluding service providers that appear as a single one to the user. Strikingly, service providers, individually, cannot disclose any of the user's data but, together, are able to offer data storage and processing capabilities. Additionally, we evaluate SafeRegions exposing performance trade-offs imposed by security mechanisms and provide useful insights for future research on performance optimization

    Performance optimization and security of EEG/ERP portal

    Get PDF
    Předmětem této práce je výkonová optimalizace a bezpečnost EEG/ERP portálu vyvíjeného na Katedře informatiky a výpočetní techniky. Portál slouží jako úložiště pro data a metadata získaná při výzkumných EEG měřeních. Teoretická část této práce ukazuje základní postupy pro optimalizaci databázového modelu, informace o objektově-relačním mapování spolu se způsobem použití nástroje Hibernate a zmiňuje časté problémy vyskytující se při navrhování datové vrstvy webových aplikací. V části zabývající se bezpečností jsou uvedeny nejrozšířenější bezpečnostní hrozby webových aplikací. Praktická část se zabývá především výkonovými problémy datové vrstvy EEG/ERP portálu. Dosažené výsledky jsou shrnuty a zhodnoceny a jsou navržena doporučení pro další zlepšení v oblasti datové vrstvy aplikace a v oblasti bezpečnosti.Katedra informatiky a výpočetní technikyObhájenoThe subject of this paper is divided into two parts: the performance and the security of the EEG/ERP Portal which serves as a repository for data and metadata from EEG research and which is developed at the Department of Computer Science and Engineering. The theoretical part of this thesis introduces common patterns of database model optimization, an overview of object-relational mapping together with the use of the Hibernate tool, and common issues in the database layer of the web applications. In the security part most common security threats are mentioned in overall. The practical part focuses mainly on the performance issues of the database layer of the EEG/ERP Portal. The results are then summarized and evaluated and recommendations for further improvements of the data layer and security level are given

    Database Performance Management in Cloud

    Get PDF
    Managing large chain of Hotels and ERP database comprises of core areas such as HRMS & PIP.HRMS (Human Resource Management System), which further includes areas such as Soft Joining, Promotion, Transfer, Confirmation, Leave Attendance and Exit, etc. PIP (Payroll Information Portal), wherein employees can view their individual Salary details, submit investment declaration, Reimbursement claim & CTC structuring, etc. Management of Large Chain of Hotels and ERP Database in AWS Cloud involves continuous monitoring with regards to the areas such as Performance of resource usages and optimization techniques relating to the use of PL/SQL. High Availability (HA) of data is accomplished through the Backup and Recovery mechanism and security of the data by Encryption & Decryption mechanism

    Next-Generation EU DataGrid Data Management Services

    Full text link
    We describe the architecture and initial implementation of the next-generation of Grid Data Management Middleware in the EU DataGrid (EDG) project. The new architecture stems out of our experience and the users requirements gathered during the two years of running our initial set of Grid Data Management Services. All of our new services are based on the Web Service technology paradigm, very much in line with the emerging Open Grid Services Architecture (OGSA). We have modularized our components and invested a great amount of effort towards a secure, extensible and robust service, starting from the design but also using a streamlined build and testing framework. Our service components are: Replica Location Service, Replica Metadata Service, Replica Optimization Service, Replica Subscription and high-level replica management. The service security infrastructure is fully GSI-enabled, hence compatible with the existing Globus Toolkit 2-based services; moreover, it allows for fine-grained authorization mechanisms that can be adjusted depending on the service semantics.Comment: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla,Ca, USA, March 2003 8 pages, LaTeX, the file contains all LaTeX sources - figures are in the directory "figures

    Review of trends and targets of complex systems for power system optimization

    Get PDF
    Optimization systems (OSs) allow operators of electrical power systems (PS) to optimally operate PSs and to also create optimal PS development plans. The inclusion of OSs in the PS is a big trend nowadays, and the demand for PS optimization tools and PS-OSs experts is growing. The aim of this review is to define the current dynamics and trends in PS optimization research and to present several papers that clearly and comprehensively describe PS OSs with characteristics corresponding to the identified current main trends in this research area. The current dynamics and trends of the research area were defined on the basis of the results of an analysis of the database of 255 PS-OS-presenting papers published from December 2015 to July 2019. Eleven main characteristics of the current PS OSs were identified. The results of the statistical analyses give four characteristics of PS OSs which are currently the most frequently presented in research papers: OSs for minimizing the price of electricity/OSs reducing PS operation costs, OSs for optimizing the operation of renewable energy sources, OSs for regulating the power consumption during the optimization process, and OSs for regulating the energy storage systems operation during the optimization process. Finally, individual identified characteristics of the current PS OSs are briefly described. In the analysis, all PS OSs presented in the observed time period were analyzed regardless of the part of the PS for which the operation was optimized by the PS OS, the voltage level of the optimized PS part, or the optimization goal of the PS OS.Web of Science135art. no. 107

    Association rule hiding using integer linear programming

    Get PDF
    Privacy preserving data mining has become the focus of attention of government statistical agencies and database security research community who are concerned with preventing privacy disclosure during data mining. Repositories of large datasets include sensitive rules that need to be concealed from unauthorized access. Hence, association rule hiding emerged as one of the powerful techniques for hiding sensitive knowledge that exists in data before it is published. In this paper, we present a constraint-based optimization approach for hiding a set of sensitive association rules, using a well-structured integer linear program formulation. The proposed approach reduces the database sanitization problem to an instance of the integer linear programming problem. The solution of the integer linear program determines the transactions that need to be sanitized in order to conceal the sensitive rules while minimizing the impact of sanitization on the non-sensitive rules. We also present a heuristic sanitization algorithm that performs hiding by reducing the support or the confidence of the sensitive rules. The results of the experimental evaluation of the proposed approach on real-life datasets indicate the promising performance of the approach in terms of side effects on the original database
    corecore