A High Security System For Databases

Essay by kiran_rao_infoA+, November 2004

download word file, 7 pages 3.4

Abstract - The intent of this paper is to give users of database software, a basic

understanding of the enhanced security capabilities achieved through Hard Disk

Shadowing over IP networks. The paper discusses the design and implementation of Hard

Disk Shadowing system over a packet switched Internet Protocol(IP) network. The system

creates an accurate copy of critical information at two drives simultaneously thus

providing identical failover storage devices on two servers.This leverages the existing IP

network infrastructure, hence minimizing deployment time and total cost of development.

Index Terms-Hard Disk Shadowing, Reproduction Sets, Slist, Statfile


Timely access to accurate and up-to-date information is critical to the success of businesses and

institutions today. Applications such as business intelligence and e-commerce demand it, and

people attached with them expect it.With the volume of information nearly doubling annually for

the larger organizations data storage, access and security are among the most demanding

challenges facing database management.

Database systems are today marked by a number of factors that can disrupt their normal

operations.The first factor is information growth.The systems are handling huge volumes of data,

and the volume is growing exponentially.As a result the system managers are swimming in disks

and tapes second factor is the increasing demand for access to applications. The services are now

required literally around the clock. A third factor is that systems are changing all the time, with

new applications, major enhancements to .existing applications, and new technology. Finally the

database systems face continuo us intentional or unintentional security threats.

Each of these factors directly involve or impact movements of huge amounts of data, in

increments or all at once for one reason or another, from one location to another.Hard Disk

Shadowing can provide an elegant solution for data protection, data replication...