Adaptation of the Data Access Layer to Enable Cloud Data Access
نویسندگان
چکیده
In the current era of technology, Cloud computing has become significantly popular within enterprise IT community, as it brings a large number of opportunities and provides solutions for user’s data, software, and computations. As part of the Cloud computing the service model Database-as-a-Service (DBaaS) has been recognized, where application can access highly available, scaled, and elastic data store services on demand with the possibility of paying only for the resources are actually consumed. While enterprise IT becoming larger these days, the current challenges are to manage the traditional database with entire enterprise data. One possible solution is to move the application data to the Cloud and then accessing Cloud data from the traditional application on local server. Thus, ensuring the use of economies of scale and reducing the capital expenditure of enterprise IT. Moving data layer to the Cloud introduces an issue how an application can access data from the Cloud data store services with full functionality of accessing like traditional database service. To ensure this possibility, the application needs to be implemented a Data Access Layer (DAL) separately in order to enable access to Cloud data, where DAL is responsible for encapsulating the data access functionalities and interacts with business logic within the application system. Thus reduces the application complexity and brings the solutions for managing entire enterprise, data. However, accessing heterogeneous data store services the DAL requires implementing necessary adaptations. This master’s thesis focuses on investigating the adaptations of SQL statements required for accessing Relational Database Management Systems (RDMS) in the Cloud. In this scope, we perform testing on several RDMS (i.e. MySQL, Oracle, PostgreSQL) in different Cloud services in order to determine the required adaptations. However, the adaptations are to be implemented in DAL for enable accessing Cloud data. Evaluating the adaptations of SQL statements, a software application called SQL Evaluation tool has been developed in this master’s thesis, where the application has implemented a DAL explicitly and is capable to execute the SQL statements simultaneously in different Cloud data store services. The purpose of developing this application is verifying the concept of adaptation of DAL.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012