Reference Hub2
Secure System Model for Replicated DRTDBS

Secure System Model for Replicated DRTDBS

Pratik Shrivastava, Udai Shanker
Copyright: © 2020 |Pages: 18
ISBN13: 9781799803737|ISBN10: 1799803732|ISBN13 Softcover: 9781799803744|EISBN13: 9781799803751
DOI: 10.4018/978-1-7998-0373-7.ch011
Cite Chapter Cite Chapter

MLA

Shrivastava, Pratik, and Udai Shanker. "Secure System Model for Replicated DRTDBS." Security and Privacy Issues in Sensor Networks and IoT, edited by Priyanka Ahlawat and Mayank Dave, IGI Global, 2020, pp. 264-281. https://doi.org/10.4018/978-1-7998-0373-7.ch011

APA

Shrivastava, P. & Shanker, U. (2020). Secure System Model for Replicated DRTDBS. In P. Ahlawat & M. Dave (Eds.), Security and Privacy Issues in Sensor Networks and IoT (pp. 264-281). IGI Global. https://doi.org/10.4018/978-1-7998-0373-7.ch011

Chicago

Shrivastava, Pratik, and Udai Shanker. "Secure System Model for Replicated DRTDBS." In Security and Privacy Issues in Sensor Networks and IoT, edited by Priyanka Ahlawat and Mayank Dave, 264-281. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-0373-7.ch011

Export Reference

Mendeley
Favorite

Abstract

Security in replicated distributed real time database system (RDRTDBS) is still explorative and, despite an increase in real-time applications, many issues and challenges remain in designing a more secure system model. However, very little research has been reported for maintaining security, timeliness, and mutual consistency. This chapter proposes the secure system model for RDRTDBS which secures the system from malicious attack. To prevent the request/response from malicious attack, authors have extended the system model with a cryptographic algorithm. In the cryptographic algorithm, a key must be secretly known only to the sender and receiver. Thus, in this chapter, authors have used the key generation algorithm to generate a key using an image. This secure system model maintains the confidentiality of the replicated data item and preserves its data integrity. It performs better in terms of malicious attack compared to other non-secure system models.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.