Distributed_and_NoSQL_Databases_Presentation.pptx

mail2krithvikakarthi 1 views 15 slides Oct 25, 2025
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

No SQL


Slide Content

Distributed Databases and NoSQL Databases Database Architecture, Storage, Transactions, Security

Distributed Databases - Architecture Composed of multiple interconnected databases spread across locations. Each site is autonomous but collaborates to form a single system. Transparency: Location, Replication, and Fragmentation transparency.

Distributed Databases - Data Storage Data partitioned into fragments stored at different sites. Replication ensures data availability and fault tolerance. Consistency maintained using distributed commit protocols.

Distributed Databases - Transaction Processing Distributed Transactions involve multiple databases. Two-phase commit (2PC) ensures atomicity across sites. Concurrency control ensures isolation and serializability.

Distributed Databases - Query Processing and Optimization Query decomposition and data localization. Optimization based on data distribution and network cost. Use of parallel query execution for performance improvement.

NoSQL Databases - Introduction Designed for scalability, flexibility, and high performance. Schema-less and handle unstructured or semi-structured data. Types include Document, Key-Value, Column, and Graph stores.

Document-Based Systems Store data in JSON, BSON, or XML format documents. Each document is self-descriptive and can have varied structures. Examples: MongoDB, CouchDB.

Key-Value Stores Store data as key-value pairs. Simple structure: key is unique, value can be any data type. Examples: Redis, Amazon DynamoDB.

Column-Based Systems Data stored in columns instead of rows for fast aggregation. Efficient for analytical queries on large datasets. Examples: Cassandra, HBase.

Graph Databases Data modeled as nodes (entities) and edges (relationships). Ideal for social networks, recommendations, and relationship queries. Examples: Neo4j, Amazon Neptune.

Database Security - Issues Unauthorized access and data breaches. Data integrity and availability threats. SQL injection and insider attacks.

Access Control Based on Privileges User-based and object-based privilege assignments. Privileges include SELECT, INSERT, UPDATE, DELETE. Managed using GRANT and REVOKE statements.

Role-Based Access Control (RBAC) Access rights assigned to roles rather than individuals. Users inherit permissions by role membership. Simplifies security management in large systems.

SQL Injection Attack where malicious SQL code is inserted into input fields. Can expose or alter sensitive data. Prevented by using parameterized queries and input validation.

Encryption in Databases Protects data confidentiality during storage and transmission. Types: Transparent Data Encryption (TDE), Column-level encryption. Uses cryptographic keys to secure sensitive information.
Tags