SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY, VOL. 01 (2), JUN 2020 PP. (1031-1038)


Abstract—A decentralized database has the ability to be hosted anywhere, including the Internet, the intranets or extranets of a company, or even on workstations that are dispersed around the company itself. There is also the potential that information is stored on servers that are a part of a network that is well organized. This is another option available to you. Because the information that distributed databases keep is dispersed across several computers, they have the potential to increase productivity at remote work sites. This is because distributed databases store data in a manner that is decentralized. This is because the data is stored in distributed databases in a decentralized form, which is the reason for this result. As opposed to being the only reason, the justification for this is that data storage makes it possible for transactions to be carried out on multiple workstations rather than just one. User data privacy has become a major worry over the past few years as a direct result of the proliferation of distributed databases, which are the technology that is currently considered to be the most cutting edge. This is a direct consequence of the widespread implementation of distributed database systems. On a regular basis, comprehensive inspections as well as routine maintenance must be performed on the system’s access control and general integrity. This is an imperative necessity. In the following paragraphs, we will discuss a number of solutions to the problem of data loss, all of which are based on the characteristics of distributed database systems. Each of these solutions has its own advantages and disadvantages. Multilayer access control, concurrent access, reliability, integrity, and recovery are some of the qualities that fall under this category. The fundamental timestamp method, the distributed two phase locking protocol (2PL), the distributed pessimistic protocol, and the Deadlock algorithm will be the primary foci of this research into concurrency control-based algorithms.

Keywords: decentralised database, privacy legislation, multi-level access control, and concurrent access.

REFERENCE

1. Bernstein, P. A., & Goodman, N. (1984). An algorithm for concurrency control and recovery in replicated distributed databases. ACM Transactions on Database Systems (TODS), 9(4), 596-615.
2. Rothnie Jr, J. B., Bernstein, P. A., Fox, S., Goodman, N., Hammer, M., Landers, T. A., … & Wong, E. (1980). Introduction to a system for distributed databases (SDD-1). ACM Transactions on Database Systems (TODS), 5(1), 1-17.
3. Bernstein, P. A., & Goodman, N. (1980). Fundamental Algorithms for Concurrency Control in Distributed Database Systems. COMPUTER CORP OF AMERICA CAMBRIDGE MA.
4. Ray, C. (2009). Distributed database systems. Pearson Education India.
5. Corbett, James C., Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, Jeffrey John Furman, Sanjay Ghemawat et al. “Spanner: Google’s globally distributed database.” ACM Transactions on Computer Systems (TOCS) 31, no. 3 (2013): 1-22.
6. Badal, D. Z. (1979, November). Correctness of concurrency control and implications in distributed databases. In COMPSAC 79. Proceedings. Computer 1036 Software and The IEEE Computer Society’s Third International Applications Conference, 1979. (pp. 588-593). IEEE.
7. Ramakrishnan, R., Gehrke, J., & Gehrke, J. (2003). Database management systems (Vol. 3). New York: McGraw-Hill.
8. Rosenkrantz, D. J., Stearns, R. E., & Lewis, P. M. (1978). System level concurrency control for distributed database systems. ACM Transactions on Database Systems (TODS), 3(2), 178-198.
9. Garcia-Molina, H. (1983). Using semantic knowledge for transaction processing in a distributed database. ACM Transactions on Database Systems (TODS), 8(2), 186-213.
10. Pokorný, J. (2015, June). Database technologies in the world of big data. In Proceedings of the 16th International Conference on Computer Systems and Technologies (pp. 1-12).

Ananthi P, Madan A Sendhil, Kanimozhi R, Maheswari R, Rathika C
Rathinam Technical Campus, Coimbatore, India