• Title/Summary/Keyword: SQL-database

Search Result 428, Processing Time 0.025 seconds

A Curriculum to Improve the Lecture of Database SQL (데이터베이스 SQL 강의 효율 향상을 위한 커리큘럼)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1005-1010
    • /
    • 2014
  • This paper researched to improve the educational achievements in Database SQL education. In practice, it is not possible to taste all the cases required at database field within the given class times. Therefore we analyzed out the key issues that students must learn for database education, and provided SQL patterns matching to the issues. To validate the effectiveness of this approach, we programmed practical requirements with those SQL patterns under a hypothetical database.

Methods for improving Database Performance through SQL Analysis in the Course Registration System (수강신청 시스템에서의 SQL 분석을 통한 데이터베이스 성능 향상 방안)

  • Kim, Hee Wan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.693-701
    • /
    • 2020
  • In this paper, SQL statements are analyzed to improve database performance in the current course registration system. The performance of the current database was measured through the execution plan of the SQL statements used in the transactions related to the course registration. Through the SQL analysis, the complemented SQL statements confirmed the improved performance. Overall, the performance of the course registration database system was improved through the analysis of the execution plan, and some improvement methods of the course registration SQL were shown as test results. The improved method is to reorganize the tables and index tables related to the course registration through database tuning, and utilize the SQL function to implement an optimized system that has evolved into a course database system with improved performance. The enrollment system re-adjusted by the proposed method showed excellent results in terms of performance compared to the previous enrollment system, and the integrated performance test result reduced the response time by 1.8 to 18 times.

Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection (OLE 원격 접속 기능을 이용한 MS-SQL 패스워드 취약점 점검 기능 설계)

  • Jang, Seung Ju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.97-104
    • /
    • 2015
  • This paper will feature designs for security vulnerability based on MS-SQL Database and OLE connectivity by checking the MS-SQL database password policy, the user account password access attempts, a user without password, and password does not be changed for a period of time. This paper uses the MS-SQL database and C++ linkage in order to use the OLE DB function. The design module should judge presence or absence of security vulnerability by checking database password policy, the user account password access attempts, a user without password, password does not be changed for a period of time. The MS-SQL database password associated with a feature, judging from the many features allows you to check for security vulnerability. This paper strengthen the security of the MS-SQL database by taking the advantage of the proposed ability.

Design and Implementation of SQL Inspector for Database Audit Using ANTLR (ANTLR를 사용한 데이터베이스 감리용 SQL 검사기의 설계 및 구현)

  • Liu, Chen;Kim, Taewoo;Zheng, Baowei;Yeo, Jeongmo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.9
    • /
    • pp.425-432
    • /
    • 2016
  • As the importance of information audit is getting bigger, the public corporations invest many expenses at information system audit to build a high quality system. For this purpose, there are much research to proceed an audit effectively. In database audit works, it could audit utilizing a variety of monitoring tools. However, when auditing SQLs which might be affected to database performance, there are several limits related to SQL audit functionality. For this reason, most existing monitoring tools process based on meta information, it is difficult to proceed SQL audit works if there is no meta data or inaccuracy. Also, it can't detect problems by analysis of SQL's syntax structure. In this paper, we design and implement the SQL Inspector using ANTLR which is applied by syntax analysis technique. The overall conclusion is that the implemented SQL Inspector can work effectively much more than eye-checked way. Finally, The SQL inspector which we proposed can apply much more audit rules by compared with other monitoring tools. We expect the higher stability of information system to apply SQL Inspector from development phase to the operation phase.

Design and Implementation of SQL Audit Tool for Database Performance (데이터베이스 성능을 위한 SQL 감리 도구의 설계 및 구현)

  • Liu, Chen;Kim, Taewoo;Zheng, Baowei;Yeo, Jeongmo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.203-208
    • /
    • 2016
  • Information system audit is the requirement to configure the information system successfully. However, there is a problem with reduction of efficiency in the audit work when the system capacity is growing up. In the subsidiary field of information system audit, there is the same problem. In this paper, we will focus on the database audit, and implement an SQL audit tool in order to improve the performance of a database. During the designing phase of the SQL audit tool which aim to improve the performance of a database, we have analyzed the requirements of SQL audit work. Based on the aforementioned them, the process of the SQL audit tool has been designed with SQL audit features in accordance with information audit process. During the implementation phase, we have implemented 3 main function modules according to the output of the design phase. The main modules we implemented are the audit job definition module, audit job executing module and result reporting module. With the implemented tool, it applied to an Electric Power Corporation project in China and compared with other tools that are able to use SQL audit. In this paper, the implemented SQL audit tool is able to perform the general SQL audit work and to reduce the cost of the audit work for database performance and to raise the accuracy of result and to apply the extended inspection rule which need to use SQL parsing.

Access Control Mechanism for CouchDB

  • Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.107-115
    • /
    • 2022
  • Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time.

Performance Comparison of PostgreSQL and MongoDB using YCSB (YCSB를 사용한 PostgreSQL과 MongoDB 성능 비교 분석)

  • Kim, Kisung
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1385-1395
    • /
    • 2016
  • In the era of Big Data, NoSQL databases provide solutions for problems, circumventing the limitations of traditional relational databases by using new architectures and data model. Contrary to relational database products, the range of the features architectures, and limitations of NoSQL databases is very broad. Thus, choosing the right database products requires more considerations and difficulties. The advent of NoSQL does not only promote the abundance of NoSQL products, but also stimulates the relational database realm to expand their features beyond the relational model. In order to understand NoSQL trends more accurately, here we discuss and compare NoSQL databases with relational databases. We also present the newest features associated with NoSQL in one of the most advanced open-source relational databases, PostgreSQL. To discuss future directions for PostgreSQL we analyzed the performance of NoSQL and PostgreSQL by conducting experiments using the NoSQL benchmark tool (YCSB).

The Recovery Method for MySQL InnoDB Using Feature of IBD Structure (IBD 구조적특징을이용한 MySQL InnoDB의레코드복구기법)

  • Jang, Jeewon;Jeoung, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.59-66
    • /
    • 2017
  • MySQL database is the second place in the market share of the current database. Especially InnoDB storage engine has been used in the default storage engine from the version of MySQL5.5. And many companies are using the MySQL database with InnoDB storage engine. Study on the structural features and the log of the InnoDB storage engine in the field of digital forensics has been steadily underway, but for how to restore on a record-by-record basis for the deleted data, has not been studied. In the process of digital forensic investigation, database administrators damaged evidence for the purpose of destruction of evidence. For this reason, it is important in the process of forensic investigation to recover deleted record in database. In this paper, We proposed the method of recovering deleted data on a record-by-record in database by analyzing the structure of MySQL InnoDB storage engine. And we prove this method by tools. This method can be prevented by database anti forensic, and used to recover deleted data when incident which is related with MySQL InnoDB database is occurred.

Trend Analysis of Open Source RDBMS (오픈 소스 RDBMS 동향 분석)

  • Jung, Sung-Jae;Bae, Yu-Mi;Park, Jeong-Su;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.631-634
    • /
    • 2014
  • When to build a Web and Cloud Computing environment, it is essential to used a database system. Database systems includes commercial programs, such as Oracle and MS-SQL, but also similar to the performance of commercial applications, there are many free programs. In particular, PostgreSQL, MySQL, MariaDB are no costs, but the source is open to the public can be applied to a variety of environments. This paper presents an open source relational database management system, the trends are examined.

  • PDF

Digital Forensics Investigation of Redis Database (Redis 데이터베이스에 대한 디지털 포렌식 조사 기법 연구)

  • Choi, Jae Mun;Jeong, Doo Won;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.5
    • /
    • pp.117-126
    • /
    • 2016
  • Recently, increasing utilization of Big Data or Social Network Service involves the increases in demand for NoSQL Database that overcomes the limitations of existing relational database. A forensic examination of Relational Database has steadily researched in terms of Digital Forensics. In contrast, the forensic examination of NoSQL Database is rarely studied. In this paper, We introduce Redis (which is) based on Key-Value Store NoSQL Database, and research the collection and analysis of forensic artifacts then propose recovery method of deleted data. Also we developed a recovery tool, it will be verified our recovery algorithm.