Sie sind auf Seite 1von 3

Proceedings of 1st Shri Chhatrapati Shivaji Maharaj QIP Conference on Engineering Innovations

Organized by Shri. Chhatrapati Shivaji Maharaj College of Engineering, Nepti, Ahmednagar


In Association with JournalNX - A Multidisciplinary Peer Reviewed Journal, ISSN No: 2581-4230
21st - 22nd February, 2018
MARKOV DECISION POLICY BASED DATABASE SECURITY
Prof. Reshma Totare Vishakha Swamy
Info. Technology Dept. Info. Technology Dept.
AISSMS’s IOIT AISSMS’s IOIT
Maharashtra, India Maharashtra, India
Anjali SinghTejaswiniYadav
Info. Technology Dept.
AISSMS’s IOIT
Maharashtra, India

Abstract these times which will help to update the data frequently
An advanced database security system using Markov and also keep it available for use.
based policy is proposed. In large databases in this
work, along with it’s a difficult task to keep the data up RELATED WORK
to date where huge data of dynamic nature occurs. In e- Wei Zong et al.[1], discussed the data timeliness and the
commerce sites, large data lands up and the database data updation policy which will be used for the rollback
might not get updated. This causes staleness in data and and data updation in the project. This paper has
also, if the database undergoes updation, it might not be developed Markov decision process model, solved by
available for access during that time. Sometimes, dynamic programming method, to obtain the optimal
updation is not possible without human intervention, update policy that minimizes the sum of data staleness
hence Markov based policy is used which would perform cost and update cost, it however does not guarantee a
fixed interval updates effectively and lead to cost strong security during the updation process.
savings. In addition to updation, this policy can be used O¨ zgeCepheli et al.[2] introduces an encryption-aware
for the security of the system;the proposed system has a physical layer security framework. This framework
middleware that will restore the database using the allocates resources according to the distinct
Markov updation policy in case of attack. The requirements, enabling to tune the overall power
middleware will process the changes in the data and consumption and the secrecy levels.
display the details of the attacker and also the changes Qi Han, NaliniVenkatasubramanian [3] Addressed the
done by the attacker. Thus, this database system can also Tradeoffs in Information Collection for Dynamic
be secured using the Markov policy and this three Environmentsto accommodate the diverse
layered security framework.ss characteristicsof information sources and varying
requirementsfrom information consumers.
Keywords: Database Security, Safety In Large Databases, Il-Min Kim, Byoung-HoonKim [4] designed a BER-Based
Database Updation, Markov Policy. Physical Layer Security with FiniteCodelengthto achieve
a sufficient level of physical layer security, while
INTRODUCTION AND MOTIVATION ensuring reliable reception quality for legal users.
In recent times, people have largely started shopping
online, banking online and many other processes are III PROPOSED SYSTEM
digitalized.E-commerce sites are growing largely day by The objective of the proposed systemis to develop a
day. These sites are exposed a large amount of public secured online shopping website with a strong, safe and
globally and hence it is very important to keep them secured database which allows consumers to directly
secure. Large amount of data of different nature occurs buy goods or services from a seller over the Internet
on these sites and should be frequently updated. Also using a web browser. The main motto of this application
during updation there is a chance of the database being is to protect our banking system from various attacks.
unavailable for access. The data cannot be kept constant Another one is to develop the 3-layer system such as
nor can the security be compromised. Analyzer Engine, Secured Engine and a Rollback Engine.
It has hence become of vitally important to The analyzer engine will trace the database & changes
providedatabases which get frequently updated and the made by an attacker will be visible on a front end. Id,
same time is secure too.In this era it is experienced that password, IP address of attacker would be displayed on
the data occurs from different sources and is of dynamic the Screen. Then Secured layer act as a middleware,
nature.Therefore, it is needed to have a vigilant eye on where a request made by user or attacker will go this
eavesdroppers and attackers who can cause severe layer. The last one is Rollback Engine will revert all
damage to the system and huge losses to the people modification & give original data in case of an attack and
involved in online transactions. It can become very the important data will be retained as it was before.
difficultto track this attacker and the modification done The following figure shows the architectural
by the attacker if the database is not frequently updated composition of the system:
or kept a track of properly.Also it is very expensive to
include human intervention each time such unethical
activity is observed to revert the data and to obtain
details of the attacker.Hence such a system is needed in

22 | P a g e
Proceedings of 1st Shri Chhatrapati Shivaji Maharaj QIP Conference on Engineering Innovations
Organized by Shri. Chhatrapati Shivaji Maharaj College of Engineering, Nepti, Ahmednagar
In Association with JournalNX - A Multidisciplinary Peer Reviewed Journal, ISSN No: 2581-4230
21st - 22nd February, 2018
We must find an optimal decision for update δmsuch
that δm= (dm, dm+1,…, dM )and m=1,2,…M.
The expected optimal total cost from tm to tM is given by
V*m=min (cm(sm,dm)+∑sm+1 Psm, dm, sm + 1.(V*m+1))
To obtain optimal update policy from time tm to tM , Vm
and Vm*have to be analyzed.
Therefore from the above equation,
R(sm, dm) =cm(sm, dm)+ ∑sm+1 Psm, dm, sm +
1.(V*m+1)
Or simply,
V*m=min R(sm,dm)
Hence, the optimal system cost is dependent on dm.

C. Analysis of optimal update policy


As considered dm takes value either 0 or 1. Therefore,
d*m increases from 0 to 1.
Therefore,that is to say there is a control limit lm for
system state sm at each decision point which determines
the optimal decision policy 0 or 1.
Therefore,
d*m=0 if sm<lm
ALGORITHMS d*m=1 if sm>lm
A. System Analysis The objective hence, is to find the value for
Let dm be the update decision for the database. control limit lm. Backward induction is an efficient
If dm=0, the database is not updated and if dm=1, then method for solving markov based decision problem. The
the database is updated at that respective point of time control limit has to be found out at every decision point,
tm=0. which is the minimum quantity of data that satisfies the
Let sm be the system state. condition thatR(sm, dm=0)>=R(sm, dm=1) for m=1, 2,
Then, at time tm+1; 3…M, because at each step V *m+1 for all possible system
If dm=0; sm+1=sm+Im states has to be computed. But d*mincreases from 0 to 1
WhereImis the new data accumulated between time tm for system states sm, therecords for R(sm, dm=0) and
and tm+1. R(sm, dm=1) can be recorded and compared at each step
If dm=1; sm+1=Im till the minimal sm makes R(sm,dm=0) exceed or equal
R(sm,dm=1).This minimal sm that makes
B. System cost analysis R(sm,dm=0)exceed or equal R(sm,dm=1) is the control
Let cm be the system cost. It is a function of system state limit lm.
and the update decision given by cm(sm,dm).
If dm=0; cm(sm, dm) =cs(sm) NOTATION SUMMARY
where cs(sm)is the staleness cost that is incurred dm Update decision
between time tm and tm+1. sm System state
If dm=1; cm(sm, dm)=cu tm Time instant
Wherecu is the incurred update cost. Im New arrived data from tm to tm+1
Based on the update decision and the corresponding cost
cs(sm) Staleness cost between tm to tm+1
atsystem time tm, we can formulate the objective
Vm total expected system cost between
function of thepurchase data update problem as
system time intervals tm to tm+1
C = minE (c1 (s1, d1) + c2 (s2, d2) + ···+ cM(sM ,dM))
R(sm,dm) Optimal update policy
Based on the above equation, we have
V1=E(c1(s1,d1)+ c2(s2,d2) +c3(s3,d3)+…+.cM(sM,dM) ) lm Control limit for data updation
Where v1 represents the total expected system cost.
Same manner, EXPECTED RESULT
V2=E(c2 (s2,d2) +c3(s3,d3)+…+.cM(sM,dM) ) The proposed system would give a protection
Therefore, against malicious attacks, since the unethical changes
V1=c1 (s1, d1)+V2 will not be maintained in the database, and also the
Generally hacker can be found, because all the details of the
VM=cM(sM, dM) attacker, details of done modifications would be
The probability distribution sm transiting tosm+1is displayed to the administrator. It is also expected that
included so that all the values of the accumulated data the system would enhance the database performance by
are considered to get the equation: reducing the time required for database updation and
Vm=cm(sm, dm)+∑sm+1 Psm, dm, sm + 1.(Vm+1) also it will avoid data getting stale and make data more
Where Vm represents the total expected system cost fresh and handy, even in case of data occurring in
between system time intervals tm to tm+1. dynamic nature.

23 | P a g e
Proceedings of 1st Shri Chhatrapati Shivaji Maharaj QIP Conference on Engineering Innovations
Organized by Shri. Chhatrapati Shivaji Maharaj College of Engineering, Nepti, Ahmednagar
In Association with JournalNX - A Multidisciplinary Peer Reviewed Journal, ISSN No: 2581-4230
21st - 22nd February, 2018

CONCLUSION
In this paper is contained, the study of various
methods for addressing data timeliness, data accuracy
and data tradeoff costs. It contains a middleware as a
solution to the security and integrity threats of the
databases, also explained along is the architecture of the
system that uses the markov based update policy for the
update and security of data. Algorithms that will be used
for the system implementation are explained in detail
herewith.

REFERENCES
1) Wei Zong, Feng Wu, and Zhengrui Jiang “A Markov-
Based Update Policy for Constantly Changing
Database Systems”, 2017.
2) O¨ zgeCepheli, Guido Dartmannz, Gu¨nes¸ Karabulut
Kurt_, GerdAscheid, “An Encryption Aware Physical
Layer Security System” 2017
3) Qi Han, NaliniVenkatasubramanian, “Addressing
Timeliness/Accuracy/Cost Tradeoffs in
Information Collection for Dynamic Environments”,
IEEE 2003
4) ] Il-Min Kim, Byoung-Hoon Kim, “BER-Based
Physical Layer Security with Finite Code length”,
2016

24 | P a g e

Das könnte Ihnen auch gefallen