期刊文献+

混合数据库中的脏数据隔离优化技术仿真 被引量:6

Simulation of Optimization Technology of Dirty Data Isolation in Hybrid Database
下载PDF
导出
摘要 研究分布式混合数据库中脏数据有效隔离的问题。分布式混合数据库中,不同区域的数据属性不同,属性体现出的威胁程度由于属性和所在区域的差异,会形成较大反差。传统的安全体系无法对数据库中的不同区域的脏数据根据属性进行高效的隔离,导致数据库中受损数据量不断增加。提出一种基于阀值和隔离标识的脏数据隔离方法,分析分布式混合数据库的实时事务模型,通过数据干扰关系给出损坏数据的确定方法,采用阀值对分布式混合数据库中的脏数据进行动态分区聚类,采用基于隔离标示向量的脏数据实时隔离算法对分布式混合数据库中的脏数据进行准确的隔离和修正,确保分布式混合数据库的完整性和准确性。实验结果说明,上述隔离方法能够对数据库中的脏数据进行准确的隔离。 In this paper, the effective isolation problem of dirty data in distributed hybrid database was studied. This paper presented a method for the isolation of dirty data based on threshold and isolation identity. Firstly, the real time transaction model in distributed hybrid database waaas analyzed. Using data interference relationship gave the determining method corrupted data. Then, the threshold value was used to make dynamical partition clustering of the dirty data in distributed hybrid database. Meanwhile, the dirty data isolation algorithm in real time based on identi fied vector was applied for dirty data accurate isolation and correction in the distributed hybrid database to ensure the completeness and accuracy of distributed hybrid database. Experimental results show that the method can accurately isolate dirty data in the database.
作者 吕俊亚
出处 《计算机仿真》 CSCD 北大核心 2014年第4期252-254,268,共4页 Computer Simulation
关键词 分布式混合数据库 脏数据 阀值 隔离标识 数据干扰关系 隔离 Distributed hybrid database Dirty data The threshold Isolation identification Data interference rela-tionship Isolation
  • 相关文献

参考文献5

二级参考文献23

  • 1王能斌.数据库系统原理[M].北京:电子工业出版社,1999..
  • 2钟远明.事务模型中Snapshot加锁机制的研究.2000年华南理工大学电子与信息学科研究生学术研讨会论文集[M].-,-.301-305.
  • 3袁曾任,人工神经元网络及其应用,1999年
  • 4周江文,抗差最玄乘法,1997年
  • 5Panda B., Haque K. A., Extended data dependency approach:A robust way of rebuilding database. In: Proceedings of the 2002 ACM Symposium on Applied Computing, New York,2000, 446-452
  • 6Panda B. , Tripathy S.. Data dependency based logging for defensive information warfare. In: Proceedings of the 2000 ACM Symposium on Applied Computing, New York, 2000, 361365
  • 7Hu Y. , Panda B.. Identification of malicious transactions in Database Systems. In: Proceedings of the 7th International Database Engineering and Applications Symposium, 2003, 329-335
  • 8Liu P. , Jing J. , Luenam P. , Wang Y. , Li L. , Ingsriswang S.. The design and implementation of a self-healing database system. Journal of Intelligent Information Systems, 2004, 23(3): 247-269
  • 9Bernstein P. A. , Hadzilacos V. , Goodman N.. Concurrency Control and Recovery in Database Systems. Addison-Wesley,1987
  • 10Liu P.. Architectures for intrusion tolerant database systems.In: Proceedings of the 18th Annual Computer Security Applications Conference, 2002, 311-320

共引文献80

同被引文献53

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部