Security Recovery Concurrency Control: Lakshmi Kantakumar N
Security Recovery Concurrency Control: Lakshmi Kantakumar N
and
Concurrency control
Lakshmi KantaKumar N
Security: The state of being free from danger, injury and
defence against failure.
Database Vulnerabilities:
Database security can be broken down into the
following key points of interest:
Server Security
Database Connections
Table Access Control
Restricting Database Access
Server Security:
•Server security is the process of limiting actual access to
the database server itself
•It is the most important angle of security and should be
carefully planned.
•Trusted IP addresses:
Every server should be configured to only allow trusted IP
addresses.
Database Connections:
Example:
Consider two travellers who go to electronic kiosks at the same
time to purchase a train ticket to the same destination on the same
train. There's only one seat left in the coach, but without
concurrency control, it's possible that both travellers will end up
purchasing a ticket for that one seat. However, with concurrency
control, the database wouldn't allow this to happen. Both travellers
would still be able to access the train seating database, but
concurrency control would preserve data accuracy and allow only
one traveller to purchase the seat.
Concurrency Control Locking Strategies:
Pessimistic Locking:
This concurrency control strategy involves keeping an entity in
a database locked the entire time it exists in the database's
memory.
This limits or prevents users from altering the data entity that is
locked.
There are two types of locks that fall under the category of
pessimistic locking:
Write lock
Read lock
"That is the whole, this is the Whole; from the Whole, the Whole
arises; taking away the Whole from the Whole, the Whole
remains"