IJISC
  • Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Performance Enhancements for Database Transactions


    Author(s): DINCĂ, Ana-Maria; AXINTE, Sabina-Daniela; BACIVAROV, Ioan

    Quick view | Full article | Citations | Views: 272


    Author(s) keywords: , , , ,


    Reference keywords: , , ,


    Abstract:

    Today’s evolution of the software development imposing demands and the ever-increasing competitivity between applications, considering not only their aesthetical appearance or ease of use, but also through continuously boosting their performance and suppressing their operation latency. This paper analyzes the resilience of architectural mechanisms for data persistence, to ensure the security of an information system against cyberattacks and preventing the disruption in the integrity and availability of the stored data. The study consists of a Fault Tree Analysis that underlines various design and implementation flaws, caused by the most common mistakes introduced by the software development teams in worldwide information systems. Solutions are proposed for every triggering event, minimizing the impact on the operations’ efficiency and decreasing transactions’ latency.



    References:

    [1]. Y. Einav, "Gigaspaces," 2019. www.gigaspaces.com/blog/amazon-found-every-100ms-of-latency-cost-them-1-in-sales.
    [2]. A. Charters, "CloudEmployee - Why is SQL Database Performance Tuning Important for Your Business?," 2021. www.cloudemployee.co.uk/blog/productivity/why-is-sql-database-performance-tuning-important-for-your-business.
    [3]. "ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems," 27001:2022, ISO/IEC.
    [4]. A.M. Dinca and S.D. Axinte, "Security enhancements for cloud applications," in International Conference on Cybersecurity and Cybercrime, 2022.
    [5]. ABTECH Technologies, abtechtechnologies.com/here-are-7-reasons-for-why-databases-will-crash-and-why-you-need-a-hands-on-dba-to-partner-with/, 2021.
    [6]. R. Chenkie and D. Norman, "Troubleshooting database outages and connection issues," www.prisma.io/dataguide/managing-databases/database-troubleshooting.
    [7]. "ISO/IEC 27031:2011, Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity," ISO/IEC 27031:2011.
    [8]. "Caching Best Practices," www.aws.amazon.com/caching/best-practices/.
    [9]. "EC2 Autoscaling: The Basics and 4 Best Practices," www.spot.io/resources/aws-autoscaling/ec2-autoscaling-the-basics-and-4-best-practices/.
    [10]. K. Mindanao, "Cloud Downtime Explained (& What You Can Do About It)," 2022. www.itsasap.com/blog/cloud-downtime-explained.
    [11]. "How to scale a database," 2021. www.fauna.com/blog/how-to-scale-a-database.
    [12]. M. Kurzeja, "Top 5 hacks to fix slow web applications," 2020. www.accesto.com/blog/top-5-hacks-to-fix-slow-web-applications/.
    [13]. J. Kanjilal, "Lock it, Block it, but Don't Deadlock it," 2020. www.arctype.com/blog/database-deadlock/.
    [14]. J. D'Antoni, "Why Does My Database Need Indexes?," 2021. www.orangematter.solarwinds.com/2021/05/27/why-does-my-database-need-indexes/.



    Additional Information

    Article Title: Performance Enhancements for Database Transactions
    Author(s): DINCĂ, Ana-Maria; AXINTE, Sabina-Daniela; BACIVAROV, Ioan
    Date of Publication: 2022-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2022.02.02
    Issue: Volume 11, Issue 2, Year 2022
    Section: Advances in Information Security Research
    Page Range: 29-34 (6 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.