Description: Description: E:\banner.gif

Objectives of Database Management Systems:

Data Availability, Integrity, Security and Independence




Database management systems have made a revolution in modern society. Business houses are making huge profits just because of database management system. DBMS provides a lot benefits in all spheres of human activity – the objectives are manifold. The main objectives of database management system are data availability, data integrity, data security, and data independence.

Data Availability: Data availability refers to the fact that the data are made available:

  • To a wide variety of users

  • In a meaningful format

  • At reasonable cost

  • With ease of access

  • When and where required

Data availability defines the degree or extent to which data is readily usable along with the necessary IT and management procedures, tools and technologies required to enable, manage and continue to make data available. Data availability also refers to data acquisition by the system. It draws upon all the data sources, different types and formats, and their conversions before becoming part of the database. Much data needs to be pre-processed before becoming part of the database.

Data availability is a term used by computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through “disastrous”. Anytime a server loses power, for example, it has to reboot, recover data and repair corrupted data. The time it takes to recover, known as the mean time to recover (MTR), could be minutes, hours or days. Data availability is also affected by MTR.

Data Integrity: Integrity is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. Data integrity refers to the correctness of the data in the database. In other words, how reliable is the data available in the database. Integrity also means your data is authentic and consistent. DBMS has various validity checks that make your data completely accurate and consistence. Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle.

Data Security: Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, websites, databases or parts thereof. Data security refers to the fact that only authorized users can access the data. Data security can be enforced by passwords. If two separate users are accessing a particular data at the same time, the DBMS must not allow them to make conflicting changes. Data security protects data from corruption. It also refers to the collective measures used to protect and secure a database and its management software from illegitimate use and malicious threats and attacks. It includes the processes, tools and methodologies that ensure security within a database environment. Data security is an essential aspect of IT for organizations of every size and type.

For various reasons, much of the data used by database management systems is stored in the cloud. Here are five data security tips to help you tackle issues of cloud privacy:

  1. Avoid storing sensitive information in the cloud.

  2. Read the user agreement to find out how your cloud service storage works.

  3. Be serious about passwords.

  4. Encrypt.

  5. Use an encrypted cloud service.

Data Independence: One of the main objectives of DBMS is to facilitate sharing of a database by current and future applications. One should be able to run DBMS on any platform. The DBMS should not be tailored to a specific platform. DBMS must ensure data independence for application programs. Data independence allows:

  1. Change of database without affecting application programs

  2. Change of hardware or system software without affecting application programs

  3. Sharing of data by different applications by providing views appropriate for the application

  4. Control of Redundancy – Avoid duplication

Description: Description: E:\vine1.gif

Notes & Handouts

The Himalayas

Kumaon Himalayas

Askot Basemetals



This website is hosted by

S. Farooq

Department of Geology

Aligarh Muslim University, Aligarh - 202 002 (India)