DBMS Microproject Group9
DBMS Microproject Group9
DBMS Microproject Group9
Rationale
Cource Outcomes
Literature Review
Actual Methodology Followed
Actual Resources Used
Information
Output of the Microproject
Learning Outcomes of Microproject
Application of Microproject
Area of Future Improvements
Conclusion
RATIONALE
Transaction logs are also stored in the backup along with the
database data because without them, the data would be useless.
Cource outcomes
LITERATURE REVIEW
1. First to understand the topic we took the advice from our respected
sir.
Computer-Based Controls
The different forms of countermeasure to threats on computer systems
range from physical controls to managerial procedures. In spite of the
range of computer-based controls that are preexisting, it is worth noting
that, usually, the security of a DBMS is merely as good as that of the
operating system, due to the close association among them.
Most of the computer-based database security are listed below:
Access authorization.
Access controls.
Views.
Backup and recovery of data.
Data integrity.
Encryption of data.
RAID technology.
What is Access Controls?
The usual way of supplying access controls to a database system is
dependent on the granting and revoking of privileges within the database. A
privilege allows a user to create or access some database object or to run
some specific DBMS utilities. Privileges are granted users to achieve the
tasks required for those jobs.
The database provides various types of access controls:
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Privileges
The authority or permission to access a named object as advised manner,
for example, permission to access a table. Privileges can allow permitting a
particular user to connect to the database. In, other words privileges are
the allowance to the database by the database object.
Database privileges —
A privilege is permission to execute one particular type of SQL statement or
access a second persons’ object. Database privilege controls the use of
computing resources. Database privilege does not apply to the Database
administrator of the database.
System Privileges —
A system privilege is the right to perform an activity on a specific type of
object. for example, the privilege to delete rows of any table in a database is
system privilege. There are a total of 60 different system privileges.
System privileges allow users to CREATE, ALTER, or DROP the database
objects.
Object Privileges
An object privilege is a privilege to perform a specific action on a particular
table, function, or package. For example, the right to delete rows from a
table is an object privilege. For example, let us consider a row of table GPG
that contains the name of the employee who is no longer a part of the
organization, then deleting that row is considered as an object privilege.
Object privilege allows the user to INSERT, DELETE, UPDATE, or SELECT the
data in the database object.
Roles
A role is a mechanism that can be used to allow authorization. A person or a
group of people can be allowed a role or group of roles. By many roles, the
head can manage access privileges very easily. The roles are provided by
the database management system for easy and managed or controlled
privilege management.
Properties –
The following are the properties of the roles which allow easy privilege
management inside a database:
Reduced privilege Administration —
The user can grant the privilege for a group of users who are related
instead of granting the same set of privileges to the users explicitly.
Dynamic privilege management —
If the privilege of the group changes then, only the right of role needs to be
changed.
Application-specific security —
The user can also protect the use of a role by using a password.
Applications can be created to allow a role when entering the correct and
best password. Users are not allowed the role if they do not know about the
password.
Recovery techniques
Recovery techniques are heavily dependent upon the existence of a special
file known as a system log. It contains information about the start and end
of each transaction and any updates which occur in the transaction. The
log keeps track of all transaction operations that affect the values of
database items. This information is needed to recover from transaction
failure.
The log is kept on disk start_transaction(T): This log entry records that
A transaction T reaches its commit point when all its operations that
access the database have been executed successfully i.e. the transaction
has reached the point at which it will not abort (terminate without
completing). Once committed, the transaction is permanently recorded in
the database. Commitment always involves writing a commit entry to the
log and writing the log to disk. At the time of a system crash, item is
searched back in the log for all transactions T that have written a
start_transaction(T) entry into the log but have not written a commit(T)
entry yet; these transactions may have to be rolled back to undo their
effect on the database during the recovery process
items to be updated are cached into main memory buffers and then
updated in memory before being written back to disk. A collection of in-
memory buffers called the DBMS cache is kept under control of DBMS
for holding these buffers. A directory is used to keep track of which
database items are in the buffer. A dirty bit is associated with each
buffer, which is 0 if the buffer is not modified else 1 if modified.
Shadow paging – It provides atomicity and durability. A directory with n
entries is constructed, where the ith entry points to the ith database
page on the link. When a transaction began executing the current
directory is copied into a shadow directory. When a page is to be
modified, a shadow page is allocated in which changes are made and
when it is ready to become durable, all pages that refer to original are
updated to refer new replacement page.
Some of the backup techniques are as follows :
Full database backup – In this full database including data and database,
Meta information needed to restore the whole database, including full-
text catalogs are backed up in a predefined time series.
Differential backup – It stores only the data changes that have occurred
since last full database backup. When same data has changed many
times since last full database backup, a differential backup stores the
most recent version of changed data. For this first, we need to restore
a full database backup.
Transaction log backup – In this, all events that have occurred in the
database, like a record of every single statement executed is backed up.
It is the backup of transaction log entries and contains all transaction
that had happened to the database. Through this, the database can be
recovered to a specific point in time. It is even possible to perform a
backup from a transaction log if the data files are destroyed and not
even a single committed transaction is lost .
OUTPUT OF MICROPROJECT