CSCE 727-Group1

CSCE 727-Group1 - IssuesinDataStream...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Issues in Data Stream  Processing and Management Neeraj Agrawal Ankur Jain Jeffrey Kirby 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
References Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Bertino.  Security Punctuation Framework for Enforcing Access Control on  Streaming Data. Michael Stonebraker, Uğur Çetintemel, Stan Zdonik.   The 8  Requirements of Real-Time Stream Processing .   Nick Koudas, Divesh Srivastava.   Data Stream Query Processing. J. Barlett, J. Gray, and B. Horst. Fault tolerance in Tandem  computer systems. Tandem Computers TR 86.2., 1986.           2
Background image of page 2
Overview What is a data stream and its relevance with  Information Warfare? Why not traditional DBMS? 8 Requirements of Stream Processing Data Stream Access Control Mechanisms Security Punctuations Advantages/Disadvantages of SP model Performance of SP on 8 requirements Conclusion 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is a Data Stream? Alliance for Telecommunications Industry  Solutions (ATIS) Glossary: A sequence of digitally encoded signals (packets of    data) used to represent information in transmission. Wikipedia: Any ordered pair ( s ,Δ) where: s  is a sequence of tuples and  Δ is a sequence of positive real time intervals.  4
Background image of page 4
Data Stream Examples Financial applications (e.g. stock trades) Network monitoring and security Web applications Sensor networks Environmental monitoring Industrial process monitoring Healthcare Tracking Satellite transmission Military (command and control, soldier locations) 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Widespread use of data streams Reliance on services provided by data stream  systems Security of data streams is very important Breach of security may result in: Loss of information Loss of privacy Misinformation 6
Background image of page 6
Human Analogy How do humans decide what's important (and should  be remembered) and what can be discarded? 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Data Streams Transactional data streams: log interactions  between entities Credit card: purchases by consumers from  merchants Telecommunications: phone calls by callers to  dialed parties Web: accesses by clients of resources at servers Measurement data streams: monitor evolution  of entity states IP network: traffic at router interfaces Sensor networks: physical phenomena, road traffic 8
Background image of page 8
DBMS versus DSMS DBMS Finite stored data sets “Store and Query” approach One-time queries Data Stream Management System (DSMS) Unbounded data Continuous queries 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Popular DSMS Examples Aurora Joint effort between Brandeis, Brown, and MIT Focuses on real-time stream monitoring applications Superceded by Borealis
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 727 taught by Professor Staff during the Spring '11 term at South Carolina.

Page1 / 41

CSCE 727-Group1 - IssuesinDataStream...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online