Abstract

Distributed database is a collection of multiple databases that can be stored at different network sites. It acts as an important role in today’s world intended for storing and retrieving huge data. The implementation of distributed database advantages such as data replication, low operating costs, faster data transaction and data processing, but security is still a significant problem. In this paper make clear to explain security issues of distributed database and give the suggestion to improve security of distributed database. Subsequently, secured distributed database design in light of trusted node is proposed. The design contains a unique node in a system called a trusted node for each site through which every single other node will get to the database. Trusted node process client demands, joins the outcomes from concerned distributed databases and forward it to the confirmed client. The system adjusted by the trusted nodes keeping in mind the end goal to give authentication is Key Agreement based Secure Kerberos Authentication Protocol (KASKAP). Hence authenticated users can only access the database.

Highlights

  • Today data is a kind of important source considered in information system

  • The trusted node enables mutual authenticates based on the Key Agreement based Secure Kerberos Authentication Protocol (KASKAP)

  • Security is a one of the considerable area in distributed database system in this paper proposed a Key Agreement based Secure Kerberos Authentication Protocol (KASKAP) using trusted node for increasing the security when access the global transaction

Read more

Summary

Introduction

Today data is a kind of important source considered in information system. Data source is an essential part of core capability of enterprise [1]. The global transaction process using an intermediate for improving the security from the hackers which is called as trusted node [5]. Trust node process takes requests from the users and forward to the distributed database after that transitory the response from database to client using authentication. Of the database technology have client based key identification which have some drawback move to the mutual authentication in distributed storage system. Key established the both sites such as client and the distributed node the transactions are effectively executes between the client and the node in secured manner.

Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call