Optimized Approach for Secure Data Sharing in Distributed Database
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1316800

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1017

References:


[1] A. Animesh, and P. R. Rao. "Synthesizing heavy association rules from different real data sources." Pattern Recognition Letters 29, 2008, no. 1, pp. 59-71.
[2] A. Serge, B. Alexe et al., "An electronic patient record" on steroids": distributed, peer-to-peer, secure and privacy-conscious." In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30, VLDB Endowment, 2004, pp. 1273-1276.
[3] B. Angela, "HePToX: marrying XML and heterogeneity in your P2P databases." In Proceedings of the 31st international conference on Very large data bases, VLDB Endowment, 2005, pp. 1267-1270.
[4] B. Ignacio, V. Hernández, and F. Mas. "A p2p platform for sharing radiological images and diagnoses." In Proc DiDaMIC Workshop. 2004.
[5] C. Mario, et al., "SIGMCC: A system for sharing meta patient records in a Peer-to-Peer environment." Future Generation Computer Systems 24, 2008, no. 3, pp. 222-234.
[6] F. Karen A, and K. Cochran, "Using data mining and data warehousing techniques." Industrial Management & Data Systems 99, 1999, no.5, pp.189-196.
[7] P. Karthik, G. T. Reddy and Kaari V “Tuning the SQL Query in order to Reduce Time Consumption” International Journal of Computer Science Issues, July 2012, Volume 9, 4(3), 418-423.
[8] J. Benjamin and J. Grimson, "Synapses/SynEx goes XML." Studies in health technology and informatics, 1999, pp. 906-911.
[9] M. Meghdad et al., "Sharing Clinical Information in P2P Environment with RBAC Mechanism." IJCSNS International Journal of Computer Science and Network Security 9, 2009, no. 1, pp.7-14.
[10] M. Gerome and D. Suciu,"Cryptographically Enforced Conditional Access for XML." In WebDB, 2002, pp. 101-106.
[11] P. Amir,"Managerial decision support with knowledge of accuracy and completeness of the relational aggregate functions." Decision Support Systems 42, 2006, no. 3, pp.1494-1502.
[12] S. Benjawan, and Dia L. Ali. "Multiple reads, one write simultaneously in distributed database." Computers & industrial engineering 31, 1996, no. 1-2, pp.319-322.
[13] T. M.A Lynda, "GRIDB: A scalable distributed database sharing system for grid environments." organization 431, no. 098, pp.26.
[14] Tavares, Carlos M., and Durval M. Tavares. "Real-time distributed data base locking manager." U.S. Patent, 1996, no. 7, pp.515-537.
[15] U. Manzoor and S. Nefti, “Decentralized trust management” In Proceedings of the 17th IEEE Symposium on Security and Privacy. Oakland, CA, 2009, pp.164–173.
[16] Z. Hongwei et al., "Reliable bursty convergecast in wireless sensor networks." Computer Communications 30, 2007, no. 13 pp. 2560-2576.
[17] N. K. Govindaraju, B. Lloyd, W. Wang, M. Lin, D. Manocha, “Fast Computation of Database Operations using Graphics processors. In: Proceedings of the 2004” ACM SIGMOD International Conference on Management of Data, SIGMOD, 2004, pp. 215-226.
[18] F. Priyatna, O. Corcho, ́ J. Sequeda, “Formalisation and experiences of R2RMLbased SPARQL to SQL query translation using Morph” In: 23rd International World Wide Web Conference, 2014, Seoul, 7–11 April 2014, pp. 479–490.
[19] K. K. Hercule, M. M. Eugene, B. B. Paulin and Lilongo. B. J, “Study of the Master-Slave replication in a distributed database” International Journal of Computer Science Issues, September 2011, Volume 8, 5(3), 319-329.