Database Transaction Management
S D Kodituwakku Maduka Ashan Perera
Sri Lanka Institute of Information Technology Sri Lanka Institute of Information Technology
Malabe, Sri Lanka Malabe, Sri Lanka
[email protected] [email protected] D. N. Ayola Jayamaha J M I N Dissanayake
Sri Lanka Institute of Information Technology Sri Lanka Institute of Information Technology
Malabe, Sri Lanka Malabe, Sri Lanka
[email protected] ms20913410 @my.sliit.lk
Abstract—Database management system(DBMS) is an essential transnational database is a database management system that
application to any database system due to various service and provide the ACID properties for database operations.
support provided to manage databases as well as the data
operation. One of the main services provide by the DBMS is
Transaction management which helps to keep data security as
well as data operations such as insert, update and deletion.
Therefore, transaction management is a vast area. This paper
has narrowed down the transaction management topic into
subparts for review research papers on different sides of database
transaction management.
Index Terms—Database Management Systems,Database Trans-
actions, Mobile Database, Cloud Database
I. I NTRODUCTION
Many people involve online trading and businesses mainly
using transactions that need to be secure and highly avail-
able in the current world. Several services provide from the
databases to keep these complex transactions safe, concurrent,
and the maximum available to complete the processes [1].
In modern databases, several options provide data integrity,
data security, and concurrent access to process these transac-
tions without any issues. The data integrity option ensures
it can perform the effectiveness of the data and the data
validation over the business rule. The data secure is respon-
sible for preventing unauthorized access to the database and
modifying the data. The essential concept called concurrency Fig. 1. Principle of Database Transactions [1]
is that multiple uses can access data and perform the available
data. This is an advanced operation as it directly affects the Figure 1, clear shows the principle behind the database
performance of any database as the number of users are transactions. When transaction start there is a database a log
getting increased, the read-write operations are getting up to to track each operation and mainly use this log to undo the
the maximum level. actions when transaction is got failure.
To solve such situations, database management system de-
velopers have introduced a method called database transactions A. Properties of Database transaction
that can individually monitor the database usage and provide
service based on each transaction’s operation. • Atomicity - Atomicity of transaction means that a group
of atomic operations operate to either fully executing
II. I NTRODUCTION TO DATABASE T RANSACTIONS or not execute anything. When transaction is happening,
In an application, for a unit of a work in database side there might be some failures in the database or network
it is generating sequence of read and write (SQL queries) to side and before commit the database transactions into the
access database and that process called database transaction. A disk then, all the operation on this transaction should be
withdraw and database need to returns its initial state as
Identify applicable funding agency here. If none, delete this. if nothing has the same operation. To revert back the
transaction, it uses the database log which records all persistence. Therefore they have found that ACID four prop-
transactions details [2]. erties are required to maintain the transaction.
• Consistency - Consistency and the atomicity are closely Researches have investigated several products such as G-
related. The responsibility of this property is to ensure Store, MStore, ecStore, Sinfonia, ElasTrans. They identify
that the once the transaction is executed, it should move the transaction techniques used on those products. Also, how
from one consistence state to another. transaction failures and database logs are handled by those
• Isolation - It is important that the transactions should products. WAL (Write-Ahead-Logging) protocol is important
be independent each other. Any transaction cannot be when logging synchronously or asynchronously. Such as Dis-
interference with other transactions. Mainly, when a tributed reliability protocol, Distributed 2PL protocol, and
transaction do any data manipulation, then that block of optimistic concurrency control protocol (OCC) have been used
data should be block for other transactions. Concurrent on the products wisely. Also, recovery manager implementa-
changes made by the firm must be concurrent with any tion strategies have been investigated by researchers [4].
other firm to make changes to isolation. Isolation is When we get the researcher’s perspective they have cov-
typically defined at database level as a property that ered a wide area of transaction management with databases
defines how/when the changes made by one operation on cloud applications. They have identified several products
become visible to others [3]. which used the newest technologies with transaction man-
• Durability - This is the most important factor in any agement. In my perspective, they could do a little bit more
database as this is really expected to be available in regarding the security and the availability, those two factors
any database management systems. This is responsible also very important with cloud computing and transaction
to keep the data safe if any database crashed happened. management, when we get with the database more importantly.
If any database problem occurs, the old database should If they have covered those two points, the paper could be much
be exists and need data to be safe without any issue. [3]. complete than now.
III. T ECHNIQUES AND PRACTICES IN THE CLOUD IV. S ECURITY M ODE FOR MOBILE DATABASE
COMPUTING ENVIRONMENT TRANSACTIONS
A survey about Transaction management techniques and Mobile database systems is a subset of distributed data-
practices in the current cloud computing environment has base systems. It is a portable and detached entity from the
analyzed how scalable transactional data are accessed in cloud corporate database server even though it facilitates com-
computing by different systems. munition between the database and the servers.
In this survey they have discovers how complete transaction
management done in the cloud environment. This paper mainly
focused on review the transaction management techniques and
key concepts of transaction management.
The transaction is executing the set of query instructions
atomically on a single consistent view of the database. Cloud
computing transaction management is done by implementing
ACID (Atomicity, Consistency, Isolation, and Durability).
The researchers have investigated several cloud systems
and identified the distributed transaction is not supporting
scalability with the available design. To support the scal-
ability requirement in the distributed transaction in several Fig. 2. Mobile Database architecture [5]
systems have used data store based on the key-value schema.
Where tables are viewed as a collection of key-value entries. In today’s computing and communications era applica-tions
Researches have found key-value stores such as PNUTS, heavily rely on mobile technology. Security issues arise in
Bigtable, ecStore, and Dynamo have been used as the preferred transactions in mobile database systems due to the hardware
data store for cloud-based applications. constraints and distributed nature of the system. In [5], a se-
In the cloud, there are important factors when considering curity model for transaction management framework for peer-
implementing a database. Which they have investigated the to-peer environments is presented.We are going to analyse it’s
elastic transaction with scalability. Elasticity should be avail- usefulness in this paper.
able when there are more transactions
In the distributed transactions may update the data on A. Security mechanisms in mobile database
multiple computer systems, the perspective of the consistency 1) Importance of secure mobile databases: Securing the
and reliability aspect transaction due on four properties called mobile databases are important for a num-ber of reasons.
ACID. Atomicity ensures complete transaction, consistency One of them is to secure sensitive data. In mobile databases
followed by correctness, isolation ensures transaction indepen- there can be very sensitive and highly important data such
dence in parallel executions and durability means transaction as financial and bank details. They can be destructive in the
hands on a hacker. Therefore we need to secure those details 1) Then we will look at the advantages and limitations
in the database. Also the data-base needs to be consistent and of cloud databases: when using cloud services there are
it needs to prevent data loss. Therefore a security mechanisms accountable advantages and limitations.
should be imple-mented.
It is needed to prevent malware, virus attacks and data-
base injection attacks. The internet is vast and attacks could
be ample. There are many attacks happening when connected
to networks. Therefore they should be prevented for the
applications to function properly.
2) Mechanisms of Securing mobile databases: There are
many number of techniques to secure a mo-bile database.
Some of them are discussed in this paper. Authentication,
Encryption, Backups, Access control, DBMS configuration,
auditing and system hardening and monitoring are some of
the methods of securing a mobile database.
In authentication only authorized users are allowed to enter
and access sensitive data. Auditing helps to detect, deter, and
reduce the overall impact of unauthorised access to mobile
database.
B. Encryption and Decryption Algorithm
As mentioned in [5], an Encryption and Decryption al-
gorithm is proposed to be secure data transmission between
the base station BS and the mobile host to ensure the mo-bile
database is at the consistency level once the data is secure.
The algorithm consists of three rounds, Inversion, Re-
duction and Conversion. Each round has Inversion, Inverse
shift and Inverse Substitution operation layers.
This proposed solution is a good framework for securing
mobile databases. It uses encryption as the technique to secure
the database. The researchers have used substitution, conver-
sion and inversion techniques in the encryption and decryption
algorithms. They have researched on location dependent data
and its management in mobile databases. They have used many
rounds of substitution and inversion steps. After going through
the steps the algorithm and ana-lysing the keys they have used
it can be thought of a good encryption algorithm.
V. I SSUES AND CHALLENGES OF DATA TRANSITION
MANAGEMENT IN A CLOUD ENVIRONMENT
when we talk about data transition management in a cloud
environment, we can see that and in a cloud environment, there
are three major parts of services available. they are software as
a service, platform as a service, and infrastructure as a service
depending on the client’s needs. also, there are unpopular
subfields such as databases as a service where most clients
prefer to have their databases hosted on cloud environments Fig. 3. Advantages and Limitation in Cloud DB [6]
for many benefits.
when it comes to managing databases in a cloud environ- 2) Then we will look at issues related to when operating
ment database transition management plays a vital role. Major database on cloud: main issues can be categorized as technical
cloud service providers like Amazon, Google, and Microsoft issues operational and functional issues and security and
provide features such as data definition, data storage, and data reliability issues below table will illustrate it in detail.
retrieval as basic functions with the database as a service. these 3) Then we will look at the challenges of cloud TPS and
cloud resources are typically elastic with an infinite amount databases: when we consider cloud TPS we can identify three
of computing power and storage available on-demand per pay major topics. they are performance, ACID guarantees, and
basis. security.
• Performance: since databases are not locally hosted con- [4] Ahmad Waqas, Abdul Whaeed Mahessar, Nadeem Mohmood, Zeeshan
nection and accessibility issues can be there when it Bhatti, Mostafa Karabasi, Asadullah Shah. , “Transaction Management
Techniques and Practices In Current Cloud Computing Enviroenments”
comes to access remotely. International Journal of Database Management Systems,vol. 7, February
• ACID guarantees: it’s always hard to maintain guarantees 2015.
in the face of data replication over a huge geographical [5] Ziyad.T.Abdul-Mehdi, and Ramlan Mahmod, “Security Management
Model for Mobile Databases Transaction Management” International
distance even though the transition is committed success- Conference on Information and Communication Technologies, Damas-
fully in the cloud there can be errors. cus, Syria,2008.
• Security: It is still a questionable subject when it comes [6] J.Antony John Prabu, Dr.S Britto Ramesh Kumar, “Issues and Chal-
lenges of Data Transaction Management in Cloud Environment” Inter-
to cloud services since all valuable data is stored with national Research Journal of Engineering and Technology (IRJET), July
a third-party maintained by a third party and we only ,2015.
get promises but do not have infrastructure access to the
cloud service provider.
4) Then we will look at issues with cloud databases:
• Performance: most companies encounter many perfor-
mance challenges when dealing with multiple notes and
multiple databases.
• Bottlenecks: even though I want it to work bandwidth
is why dinner to handle many requests we often see
bottleneck challenges occur within the infrastructure in
the cloud TSP we most of the transitions when there is
an update or when there are lots of processing is going
on.
• Data security: data security is still a major concern since
data is managed by a third-party company. and since
database security and cloud securities still have a lot of
room to improve.
• Data privacy: since data is stored in a third party, and we
have small or no access to infrastructure of the provider.
since the third party can access databases and retrieve the
data without our knowledge.
• Scalability: When it comes to scalability, we must con-
sider the cost and the complexity and the technology that
we will be using to scale up and down when the demand
is high and when the demand is low.
A comfortable ACID guaranty is needed for the perfect
transaction management system. Unfortunately, the cloud en-
vironment is not fully reliable to maintain ACID properties.
It requires a better architecture to process the data transac-
tion. Management and cloud storage system. Security is an
important factor to consider the transactional data. Because
data are stored in the third party and replicated from a
large geographic distance. The next step is to implement
new architecture to completely maintain ACID properties and
strengthen the security for data transaction management in the
cloud environment.
R EFERENCES
[1] S. Liu, X. Chen, M. Chen and R. Zhang, “Research based on database
transactions” IEEE 3rd International Conference on Communication
Software and Networks, pp. 550-553, April 2011.
[2] Özsu M.T., Valduriez P, “Introduction to Transaction Management. In:
Principles of Distributed Database Systems”, Third Edition. Springer,
New York, NY pp. 550-553, 2011.
[3] A. G. Fry, ‘Expressing database transactions as atomic-operations”
Seventh International Database Engineering and Applications Sympo-
sium,pp. 320-328, April 2003.