FGSA for optimal quality of service based transaction in real-time database systems under different workload condition

  • Mohammad Sharfoddin KhatibEmail author
  • Mohammad Atique


A Real-Time Database System is referred to as a transaction execution system which is administered to manage different workloads. To store and to retrieve data onto distinctive application services database systems are utilized. Unfortunately, in most situations, Quality of Service (QoS) and security are detected separately. In order to overcome the issues an efficient real-time database system is introduced, which mainly focused on the optimization of QoS requirement (response time) as well as security strength by arbitrarily changing the security mechanisms (IDPSs) based upon the request from users. To achieve this goal, here we propose a Firefly Gravitational Search Algorithm (FGSA) to optimize the user requesting security policies under different workloads (number of user requests). The database system suffers from intrusion (attack) due to more number of users requesting for the security policies at a time. Due to this, the security of the database system may be decreased. To enhance this, combination (mix) of IDPSs (Intrusion Detection Prevention Systems) is utilized. In our environment, the number of used IDPSs is adopted to represent the effectiveness of the database system. From the simulation result, it is verified that FGSA shows better performance when compared to the existing algorithms in terms of the security strength, response time, IGD as well as with the fitness measure.


Firefly Gravitational search Intrusion detection prevention Quality of service Transaction Real-time database 



  1. 1.
    Verma, G., et al.: Transaction processing and management in distributed database systems. Int. J. Comput. Sci. Technol. 2(3), (2011)Google Scholar
  2. 2.
    Acharya, S., et al.: A dynamic slack management technique for real-time distributed embedded systems. IEEE Trans. Comput. 57(2), 215–230 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Kang, K.D., et al.: Estimating and enhancing real-time data service delays: control-theoretic approaches. IEEE Trans. Knowl. Data Eng. 23(4), 554–567 (2011)CrossRefGoogle Scholar
  4. 4.
    Viswanathan, S., et al.: Resource-aware distributed scheduling strategies for large-scale computational cluster/grid systems. IEEE Trans. Parallel Distrib. Syst. 18(10), 1450–1461 (2007)CrossRefGoogle Scholar
  5. 5.
    Roopini, B.V., et al.: Transaction management policy in distributed real-time system. Int. J. Soft Comput. Eng. (IJSCE). 3(2), 2231–2307 (2013)Google Scholar
  6. 6.
    Han, S., et al.: Adaptive co-scheduling for periodic application and update transactions in real-time database systems. J. Syst. Softw. 85(8), 1729–1743 (2012)CrossRefGoogle Scholar
  7. 7.
    Dogdu, E.: Utilization of execution histories in scheduling real-time database transactions. J. Data Knowl. Eng. 57(2), 148–178 (2006)CrossRefGoogle Scholar
  8. 8.
    Buelna, E., Monroy, R.: Real-time verification of integrity policies for distributed systems. J. Appl. Res. Technol. 11(6), 831–843 (2013)CrossRefGoogle Scholar
  9. 9.
    Ram, S., et al.: Performance transaction’s assessment of real time database system in distributed environment. Int. J. Eng. Trends Technol. (IJETT). 4(9), 4113–4118 (2013)Google Scholar
  10. 10.
    Jayanta Singh, Y., et al.: Dynamic management of transactions in distributed real-time processing system. Int. J. Database Manage. Sys. 2(2) (2010)Google Scholar
  11. 11.
    Al-Janabi, S.: Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID). In: Proceedings of International Conference on Soft Computing in Data Science, pp. 263–277 (2017)Google Scholar
  12. 12.
    Patel, A., Al-Janabi, S., AlShourbaji, I., Pedersen, J.: A novel methodology towards a trusted environment in mashup web applications. J. Comput. Secur. 49, 107–122 (2015)CrossRefGoogle Scholar
  13. 13.
    Shankaran, N., et al.: An integrated planning and adaptive resource management architecture for distributed real-time embedded systems. IEEE Trans. Comput. 58(11), 1485–1499 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Xiong, M., Ramamritham, K.: Deriving deadlines and periods for real time update transactions. IEEE Trans. Comput. 53(5), 567–583 (2004)CrossRefGoogle Scholar
  15. 15.
    Farook, S., et al.: Evolutionary hybrid genetic-firefly algorithm for global optimization. IJCEM Int. J. Comput. Eng. Manag. 16(3), 37–45 (2013)Google Scholar
  16. 16.
    Gao, S., et al.: Gravitational search algorithm combined with chaos for unconstrained numerical optimization. J. Appl. Math. Comput. 231, 48–62 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Al-Janabi, S., et al.: Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: Proceedings of International Congress on Technology, Communication and Knowledge (2014)Google Scholar
  18. 18.
    Al-Janabi, S.: Smart system to create optimal higher education environment using IDA and IOTs. Int. J. Comput. Appl. (2018). Google Scholar
  19. 19.
    Król, V., Pokorný, J.: Design of experimental platform for testing real-time database transaction processing. IFAC Proc. Vol. 39(17), 289–293 (2006)CrossRefGoogle Scholar
  20. 20.
    Al_Janabi, S., et al.: Multi-level network construction based on intelligent big data analysis. In: Big Data and Smart Digital Environment, pp. 102–118. Springer Nature Switzerland (2019)Google Scholar
  21. 21.
    Al_Janabi, S., Razaq, F.: Intelligent big data analysis to design smart predictor for customer churn in telecommunication industry. In: Farhaoui, Y., Moussaid, L., (eds.), pp. 246–272, Springer, Switzerland (2019)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Computer Science & EngineeringAnjuman College Of Engineering and Technology, SadarNagpurIndia
  2. 2.P.G. Department of Computer Science and EngineeringSant Gadge Baba Amravati UniversityAmravatiIndia

Personalised recommendations