Chapter No 4 Query optimization and Data Integrity & Security.

Slides:



Advertisements
Similar presentations
C6 Databases.
Advertisements

Database Theory Why use database? Data is a valuable corporate resource which needs adequate accuracy, consistency and security controls. The centralized.
Introduction to Structured Query Language (SQL)
Computer Concepts 5th Edition Parsons/Oja Page 492 CHAPTER 10 File And Database Concepts Section A PARSONS/OJA Databases.
1 7 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 7 DBMS Functions.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Introduction to Structured Query Language (SQL)
Database Management: Getting Data Together Chapter 14.
Fundamentals, Design, and Implementation, 9/e Chapter 11 Managing Databases with SQL Server 2000.
Chapter 3. 2 Chapter 3 - Objectives Terminology of relational model. Terminology of relational model. How tables are used to represent data. How tables.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Introduction to Structured Query Language (SQL)
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Chapter 1 Introduction to Databases
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
An Introduction to Database Management Systems R. Nakatsu.
Chapter 4: Organizing and Manipulating the Data in Databases
1 Seminar on DATABASE SECURITY Presented by: Name: SANGRAM KE CHOUDHURY Branch: MCA Regd no: G.I.A.C.R Engg. College, Rayagada.
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Concepts of Database Management, Fifth Edition
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
DAY 14: ACCESS CHAPTER 1 Tazin Afrin October 03,
Database Technical Session By: Prof. Adarsh Patel.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Introduction: Databases and Database Users
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 4th Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Storing Organizational Information - Databases
7 1 Chapter 7 Introduction to Structured Query Language (SQL) Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Instructor: Dema Alorini Database Fundamentals IS 422 Section: 7|1.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Principles of Database Design, Conclusions AIMS 2710 R. Nakatsu.
CHAPTER 3 DATABASES AND DATA WAREHOUSES. 2 OPENING CASE STUDY Chrysler Spins a Competitive Advantage with Supply Chain Management Software Chapter 2 –
6 1 Lecture 8: Introduction to Structured Query Language (SQL) J. S. Chou, P.E., Ph.D.
Databases Shortfalls of file management systems Structure of a database Database administration Database Management system Hierarchical Databases Network.
Triggers. Why Triggers ? Suppose a warehouse wishes to maintain a minimum inventory of each item. Number of items kept in items table Items(name, number,...)
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Database structure and space Management. Database Structure An ORACLE database has both a physical and logical structure. By separating physical and logical.
Introduction to Database AIT632 Chapter 1 Sungchul Hong.
1 Introduction to Oracle Chapter 1. 2 Before Databases Information was kept in files: Each field describes one piece of information about student Fields.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Chapter 3 Databases and Data Warehouses: Building Business Intelligence Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Fall 2001Database Systems1 Triggers Assertions –Assertions describe rules that should hold for a given database. –An assertion is checked anytime a table.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Indexes and Views Unit 7.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Foundations of Business Intelligence: Databases and Information Management.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
The Relational Model. 2 Relational Model Terminology u A relation is a table with columns and rows. –Only applies to logical structure of the database,
Session 1 Module 1: Introduction to Data Integrity
Mining real world data RDBMS and SQL. Index RDBMS introduction SQL (Structured Query language)
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Data Integrity & Indexes / Session 1/ 1 of 37 Session 1 Module 1: Introduction to Data Integrity Module 2: Introduction to Indexes.
What is a database? (a supplement, not a substitute for Chapter 1…) some slides copied/modified from text Collection of Data? Data vs. information Example:
CS4222 Principles of Database System
Chapter 6 - Database Implementation and Use
Functions of a Database Management System
Database Management  .
Normalization Referential Integrity
Database management concepts
Database management concepts
Chapter 11 Managing Databases with SQL Server 2000
Presentation transcript:

Chapter No 4 Query optimization and Data Integrity & Security

What is a query optimizer? Query optimization is of great importance for the performance of a relational database, especially for the execution of complex SQL statements. A query optimizer determines the best strategy for performing each query.

Concurrent user access to the same data is one of the most central and vexing issues for applications utilizing databases. Concurrency can affect two of the most important facets of any application: the underlying integrity of the data and the performance of the application system.

The query optimizer chooses, for example, whether or not to use indexes for a given query, and which join techniques to use when joining multiple tables. These decisions have a tremendous effect on SQL performance, and query optimization is a key technology for every application, from operational systems to data warehouse and analysis systems to content- management systems.

Introduction to Data Integrity Oracle uses integrity constraints to prevent invalid data entry into the base tables of the database. You can define integrity constraints to enforce the business rules you want to associate with the information in a database.

Examples of Data Integrity

Types of Integrity Constraints NOT NULL Integrity Constraints A NOT NULL constraint requires a column of a table contain no null values. UNIQUE Key Integrity Constraints A UNIQUE key integrity constraint requires that every value in a column or set of columns (key) be unique — that is, no two rows of a table have duplicate values in a specified column or set of columns.

PRIMARY KEY Integrity ConstraintsPRIMARY KEY Integrity Constraints: It consists of one or more columns to keep the records unique in the table. It should not be empty. It helps to find a record uniquely in the table. Referential Integrity Constraints Different tables in a relational database can be related by common columns, and this rule governs the relationship of the columns must be maintained.

CHECK Integrity Constraints A CHECK integrity constraint on a column or set of columns requires that a specified condition be. Database security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authenticated misuse, malicious attacks or unintentional mistakes made by authorized individuals or processes.database

Database Recovery: A database recovery log keeps a record of all changes made to a database, including the addition of new tables or updates to existing ones. This log is made up of a number of log extents, each contained in a separate file called a log file.

Data Security Two Basic Categories of Computer Security:- Physical Security:- It is concerned with physical protecting the computer resources. – Physical Security Control: Data Backup. Hardware Backup. Planning and testing.

Data Security …Cont Logical Security:- It is concerned in controlling access to information. – Logical Security Control:- Unauthorized disclosure. (viewing DB). Unauthorized modification. Unauthorized withholding.

Database and Application Security, Nov Database/Application Security Ensure that only authenticated users can access the system And can access (read/update) only data/interfaces that they are authorized to access

14 Limitations of SQL Authorization SQL does not support authorization at a tuple level – E.g. we cannot restrict students to see only (the tuples storing) their own grades Web applications are dominant users of databases – Application end users don't have database user ids, they are all mapped to the same database user id – Database access control provides only a very coarse application-level access control

Access Control in Application Layer Applications authenticate end users and decide what interfaces to give to whom – Screen level authorization: which users are allowed to access which screens – Parameter checking: users only authorized to execute forms with certain parameter values E.g. CSE faculty can see only CSE grades

Privacy Aggregate information about private information can be very valuable – E.g. identification of epidemics, mining for patterns (e.g. disease causes) etc. Privacy preserving data release – E.g. in US, many organizations released “anonymized” medical data, with names removed, but zipcode (= pincode), sex and date of birth retained Turns out above (zipcode,sex,date of birth) uniquely identify most people! – Correlate anonymized data with (say) electoral data with same information

– Recent problems at America Online Released search history, apparently anonymized, but users could be easily identified in several cases – Several top officials were fired – Earlier problems revealed medical history of Massachusetts state governer. Not yet a criminal issue, but lawsuits have happened Conflict with Right To Information Act – Many issues still to be resolved

References: Database and Application Security By S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay