• 제목/요약/키워드: Distributed database

Search Result 598, Processing Time 0.027 seconds

A Study on the Efficient Use of Database and the Office Information System (데이터베이스의 효율적 이용을 위한 사무실 정보시스템에 관한 연구)

  • Ko Young-Man
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.21
    • /
    • pp.169-190
    • /
    • 1991
  • The purpose of this study is to investigate aspects of office information systems in japanese corporations in order to understand introduction strategies and to find out whether strategy elements could be transferred to Germany. In this study, three points of view played an important role. (a) Technological and infrastructural support systems What kind of role did the liberalization of telecommunication markets and the avaliability of computer hardware play to help develope of database industry and implement office information systems? (b) Strategies and forms of the implementation of office information system: Which strategies were successful, distribution or centralization? How were technical and organizational problems handled? (c) Process of data communication : How did the implementation of office information system change the data communication with in-house or commercial database systems? To answer these questions, this study centered around a two-step field research in Japan. (1) Screening stage: to gain a general overview of office information system in Japan. The results of this initial research have been analysed and carefully evaluated to prepare for the second and major part of field research in Japan. (2) Data collection stage: interviews with respective managers, heads offices, and data processing units in 20 enterprises. The major results of this study are as follows. Today in Japan, office information system is understood as the interconnection of the in-house and commercial database for the maximization of the use of information resource In an organization. In particular, developments in the direction of distributed systems and the 'intelligent office' by means of the new information and communication technologies are very important.

  • PDF

Study On Distribute Computing Network Security Using Encrypted User Security Module (분산 네트워크 환경하에서 암호화 된 사용자 인증 모듈을 적용한 데이터베이스 보안 시스템)

  • Lee Dae-Young;Kim Ok-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.315-320
    • /
    • 2006
  • This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

A Recovery Mechanism for Server Failure in Database Systems based on Mobile computing Environments (이동 컴퓨팅 환경에 기반을 둔 데이터베이스 시스템에서 서버의 고장 회복 기법)

  • Jo, Jeong-Ran;Hwang, Bu-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.1-10
    • /
    • 1999
  • A mobile computing environment is one that support user's mobility through the wireless communication technology. Users access the database and get results what they want by running mobile transactions. To run the mobile transaction correctly and to maintain the consistency I database, we need a concurrency control method to schedule transactions, a caching method to manage the cache, and a recovery method to construct a fault tolerant system. A mobile computing system is based on the existing distributed system, but we can't use recovery methods of the existing distributed system directly because of the user's mobility and the features of wireless media. So this paper presents a recovery mechanism to construct a fault tolerant mobile computing systems. Especially. we develop and analyze a recovery algorithm for server failure among types of failure which can arise in mobile computing environments.

  • PDF

Integrated Structural Design Operation by Process Decomposition and Parallelization (프로세스 분할 병행에 의한 통합 구조설계 운용)

  • Hwang, Jin-Ha;Park, Jong-Hoi
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.113-124
    • /
    • 2008
  • Distributed operation of overall structural design process, by which product optimization and process parallelization are simultaneously implemented, is presented in this paper. The database-interacted hybrid method, which selectively takes the accustomed procedure of the conventional method in the framework of the optimal design, is utilized here. The staged application of design constraints reduces the computational burden for large complex optimization problems. Two kinds of numeric and graphic processes are simultaneously implemented by concurrent engineering approach in the distributed environment of PC networks. The former is based on finite element optimization method and the latter is represented by AutoCAD using AutoLISP programming language. Numerical computation and database interaction on servers and graphic works on independent clients are communicated through message passing. The numerical experiments for some steel truss models show the validity and usability of the method. This study has sufficient adaptability and expandability, in that it is based on general methodologies and industry standard platforms.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

Multiobjective Distributed Database System Design using Genetic Algorithms (유전적 알고리즘을 이용한 다목적 분산데이터베이스 설계)

  • Lee, Jae-Uk;Go, Seok-Beom;Jo, Jeong-Bok;Mitsuo Geo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2000-2007
    • /
    • 1999
  • Recently, DDS (Distributed Database System) has been often implemented on VAN (Value Added Network) as we know the amazing expansion of information network. DDS can yield significant cost and response time advantages over centrailzed systems for geographically distributed organizations. However, inappropriate design can result in high cost and poor response time. In a DDS design, the main problem is 1) how to select proper computer, and 2) how to allocate data fragment into proper nodes. This paper addresses DDS design problem of selecting the proper class of computers and the allocating data files on VAN. Also, the formulated model includes tow objectives, the operating and investment cost. GA (Genetic Algorithm) is developed to solve this mathematical formulation. A numerical experiment shows that the proposed method arrives at a good solution.

  • PDF

Design of Adaptive Retrieval System using XMDR based knowledge Sharing (지식 공유 기반의 XMDR을 이용한 적응형 검색 시스템 설계)

  • Hwang Chi-Gon;Jung Kye-Dong;Choi Young-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.716-729
    • /
    • 2006
  • The information systems in the most enterprise environments are distributed locally and are comprised with various heterogeneous data sources, so that it is difficult to obtain necessary and integrated information for supporting user decision. For solving 'this problems efficiently, it provides uniform interface to users and constructed database systems between heterogeneous systems make a consistence each independence and need to provide transparency like one interface. This paper presents XMDR that consists of category, standard ontology, location ontology and knowledge base. Standard ontology solves heterogeneous problem about naming, attributes, relations in data expression. Location ontology is a mediator that connects each legacy systems. Knowledge base defines the relation for sharing glossary. Adaptive retrieve proposes integrated retrieve system through reflecting site weight by location ontology, information sharing of various forms of knowledge base and integration and propose conceptual domain model about how to share unstructured knowledge.

Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System (통합 분산환경에서 타입 정보를 이용한 지속성 객체의 보안 모델 및 응용)

  • 김영수;최흥식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.661-669
    • /
    • 2004
  • As a large number of distributed systems becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. CORBA and object-oriented database which provide transparency of network and database are increasingly being used as the basis for distributed system to solve these problems. The two methods can help accomplish assurance of security by using a method-based access control technique or an attribute-based access control technique. These methods also enhance the unavailability or inefficiency caused by the delay of access process and bottleneck of the network due to the complex instance-based access control. We propose a security model on the type information based access control system that can enhance both security and availability by separating the functions delivered from CORBA and object-oriented databases. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.

Distributed Data Allocation Methods and Implementations using the Temporary Table (임시 테이블을 사용한 분산 데이타 할당 방법 및 구현)

  • Heo, Gye-Beom;Lee, Jong-Seop;Jeong, Gye-Dong;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1076-1088
    • /
    • 1997
  • Data repliciation techniques of distributed database a allocation methods occures to overhead to change together all repkicas for consistency maintenance at updates .In case of data migration horizontal or vertical fragment migration has caused to caused to increase data communication.In this paper we purpose batch proxessing method groups the associated items of table and stores temporary table assciated with file relication and migrations.This method increase the usagility of system buffer in distributed trancsaction processing with a number of data inputs and updates.After all,it improved the perform-ance of distributed transaction system by reducing disk I\O processing time and the cost of data cimmunication among local sites.

  • PDF