Security-data fragmentation, Database Management System

Assignment Help:

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist.

But how can we carry out fragmentation? Fragmentation may be carried out as per the following rules:

a)      Completeness: This rule makes sure that there is no loss of data while fragmentation. If a relation is decomposed into fragments, then every data item must appear in at least single fragment.

b)      Reconstruction: This rule makes sure preservation of functional dependencies. It should be possible to describe a relational operation that will reconstruct the relation from its fragments.

c)       Disjointness: A data item that shows in a fragment should not show in any other fragment. Though, a typical fragmentation known as vertical fragmentation is an exception to this rule. In vertical fragmentation the primary key attributes must be repeated to permit reconstruction of original relation.

This rule makes sure minimization of data redundancy. What are the dissimilar types of fragmentation?

 


Related Discussions:- Security-data fragmentation

Central database schema, Show a centralised schema to support the operation...

Show a centralised schema to support the operation of the system you have chosen, including in particular: the product catalogue; the outlets and respective stocks; customer record

Explain interblock gap, Explain Interblock gap? Interblock Gap - A trac...

Explain Interblock gap? Interblock Gap - A track of a disk is separated into equal-sized disk blocks. Blocks are separated through fixed-size gaps, called as interblock gaps th

Hass, waht is a repeating group?

waht is a repeating group?

Replication-design of distributed databases, Replication : It is definite a...

Replication : It is definite as a copy of a relation. Every replica is stored at a dissimilar site. The alternative to replication is to store only single copy of a relation which

Creating a view-data control, Creating a view: A query can be embed...

Creating a view: A query can be embedded within the CREATE VIEW STATEMENT A query can have complex select statements containing join, groups and sub- queries A quer

What is a project operation, What is a PROJECT operation? The project o...

What is a PROJECT operation? The project operation is a unary operation that returns its argument relation with particular attributes left out. Projection is shown by pie (π).

Functional dependency in entities, FDs in Entities : Student entity : ...

FDs in Entities : Student entity :                                                Enrolment number →  Student name, Address Course Entity :

Deadlock and its prevention, Deadlock And Its Prevention: As seen earlier,...

Deadlock And Its Prevention: As seen earlier, though two phase locking protocol handles the trouble of serialisability, but it causes some troubles also. For instance, consider th

Illustrate the class diagram for class room scheduling, Illustrate the clas...

Illustrate the class diagram for class room scheduling system If in any college, the number of classrooms are limited which have to be allocated to various classes and instruct

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd