Adopting a Proxy Database to Prevent Direct Access to Distributed Transaction Databases Ensuring Information Security

Ali, Mohammad Ghulam (2022) Adopting a Proxy Database to Prevent Direct Access to Distributed Transaction Databases Ensuring Information Security. Journal of Advances in Mathematics and Computer Science, 37 (3). pp. 43-55. ISSN 2456-9968

[thumbnail of 1661-Article Text-3231-2-10-20221012.pdf] Text
1661-Article Text-3231-2-10-20221012.pdf - Published Version

Download (426kB)

Abstract

In this scientific and technical practical-oriented research paper, it is proposed a concept of Proxy Database to prevent direct access to distributed transaction databases and also ensuring the data and information security. The same approach has already been implemented in our one live project. A Proxy Database is created using a set of proxy tables and views from all relational distributed databases running for all different domains for any organization/institution. Creating a proxy table, this is an alternative way of looking at the data in one or more tables and this is also an alternate way of looking at the data through one or more views from relational distributed databases. Proxy table provides indirect access to the data in the distributed table(s) of the distributed databases. Location transparency of the local data at the local distributed databases will definitely be maintained by creating a proxy table. A proxy table will be mapped with the local distributed table and tables in the form of view. A schema for all proxy tables created, that resides in the Proxy Database, but the data resides in each local distributed databases. It is proposed here a practical framework to construct a Proxy Database with a set of proxy tables created from all local relational distributed databases which are being used for all different domains. Two or more proxy tables may further be merged to get results from two or more local distributed tables located in the respective distributed databases. Illustrated some methods of creating a Proxy Database with some examples. Illustrated about the query submitted on the proxy table without join, union or intersect and this is straightway go to the respective local distributed table(s) or tables in the form of view and sending back results to the concerned client user. Illustrated about the query submitted using join, union or intersect on two or more proxy tables, query decomposition with a set of sub queries going to the respective local distributed tables or tables in the form of view, execution of each individual sub-query at each local distributed database server and finally about the query composition of all sub-queries and sending back results to the concerned client user. Discussed well about the network security proposing a viable solution by implementing a software firewall. Discussed about the local distributed databases structure modifications and propagation to the Proxy Database so that all the local distributed databases and the Proxy Database remain consistent.

Item Type: Article
Subjects: Institute Archives > Mathematical Science
Depositing User: Managing Editor
Date Deposited: 20 Jan 2023 05:39
Last Modified: 01 Mar 2024 03:40
URI: http://eprint.subtopublish.com/id/eprint/1589

Actions (login required)

View Item
View Item