UACA: Unified Access Control Approach For Heterogeneous Database Based-on Service Data Object

: The requirement for data interchange, access, and retrieval from diverse databases. This requirement is getting more and more crucial. However, retrieving this data from a heterogeneous database necessitates juggling many kinds of query languages, data models, and structure. The goal of this project is to create a unified access control approach (UACA), which will be managed by service data object (SDO) technologies and will be based on an agent mechanism for application access to business databases. To create a unified data access control, applications must be submitted through a UACA. To prevent a direct link to the database and application security threats, unified access control isolates applications from databases. Application systems submit a request for identity authentication to the database access control system using the data access protocol of the access control system. Data are finally transmitted to the application system after identity authentication, data gathering, and data transmission. This investigation led to the creation of a client-middle layer, which is also in charge of transformation and optimization, to ensure uniform data access control and access to the heterogeneous database. It also manages system communication using the TCP/IP protocol to guarantee the accuracy and reliability of the connection. SDO data retrieval offers strong adaptability and system compatibility.


Introduction
In the current world of technology, the conditions in the market are changing hence requiring flexible enterprise information management basing them on mission-critical software integration.During in the recent decades, the data models (DM) and their architecture have been significantly altered to support object methods and interoperability.Access of data from different storage is the main activity of any application service.Therefore deferent storage ways have different ways of accessing these data.The platform of the software and the programming language used in creation of this software application will give the right data access method to be used.Many data access techniques fall short of the demand for reusability in the context of service-oriented architecture, leading to the development of the service data object mechanism [1].
There are several data access methods; Microsoft has access method such as ado.net,ActiveX and ODBC, java has JDO, JDBC, and JAXB [2].These access methods are designed for specific use only, as shown in Fig. 1.

Figure 1. Data access strategies
However, there are issues and risks associated with using these data access methods when users and data are in direct contact.This means that a unified access control method database will need to be developed in order to control access to data.[3].As shown in Fig. 2..

Fig.2. Three proposed construction troubleshooting and performance testing steps
In the above figure we can say that the access to heterogeneous database between the data sources and client applications is achieved.There is data integration between them.

Related work and Main Problems Definition
Below, we will outline the work associated with performance testing for identifying and eliminating fault bottlenecks; subsequently, we will discuss the manner in which CloudPT merges with a cloudecosystem service.

Service Data Object Technologies
Service Data Object (SDO) is designed to unify and simply how applications do handle data [12].By using service data object, programmers can uniformly access and manipulate information from the heterogeneous data sources such as, relational database, Web services, and XML data sources, and also information system from enterprise [13].The basis of service data object is on the concept of the disconnected data graphs, which are graph structured data objects.
Service data object also provides a metadata API, which allows applications, tools, and frameworks to introspect the data model for a data graph.The service data object metadata API simplify and unify data source specific metadata APIs to enable applications to handle data from heterogeneous data sources in a uniform way.Aims of SDO are to support disconnected programming models, and unify access to data from heterogeneous data sources [13].

Service Data Object Architecture
Service data object is made up of composable architecture (as opposed to monolithic) [13].As shown in Fig. 3.

Components of Service Data Object
Data Object: Data objects contain the actual data, which have primitive values and referencing to other data objects.These data objects also do referencing to their metadata, which allows DO (data object) to be examined for information about data types, data relations and data constraints [13].As shown in Fig. 4.

Virtual Data Access
Virtual data access is very important requirement in enterprise environments in where data provision functions are formally separated from data use function for several reasons including; security, skills, and governance.This separation is important in SOA (Service-oriented architecture) implementation too.Service oriented architecture gives the unified client data and metadata API that enable framework, tools and runtimes to be able to function in this environment [14].As shown in Fig. 5.

Technologies of Systems Architecture
The control system which deals with the access of data from multiple data sources specifically concentrates on a central database which controls the business access database through use of program's applications.The technology involves unified access control server software and unified 29 Technium Vol. 9, pp.26-40 (2023) ISSN: 2668-778X www.techniumscience.comdata access server software the unified data access server determines if it shall access by the users after asking the unified access control server.Similarly, a unified data access server is in control of transforming and optimizing the access to database.Based on this, the unified data access shall divide these systems into various subsystems like the unified access control service [15].
At the time a user logs in, he is able to analyze and extract the permission of the user after reviewing the amount of information's then decides if it shall allow the user to access the system.Once the user is given permission, the function shall then he shall access the system including the database after judging the request and the system then redistributed in consuming the execution space and the access of control services [16], as shown in Fig. 6.

Unified data access services Unified access control services
Authority to determine the application Fig. 6.System architecture

Design and Structure of UACA
UACA is client-side server approach which was developed and designed to work with the Host server (Central database server system) to achieve unified data access interface to a heterogeneous database and data integration between the client applications and data sources.From an operation and maintenance standpoint, it offers convenience and greatly reduces the costs of operation, maintenance, management, making it easier to develop application software.System communication uses TCP/IP protocol [17], data uses XML format [18] [19], and data objects are an SDO representation of structure data.
In heterogeneous data integration based on XML, it is a key approach implementation to achieve local database and XML mapping.In order to realize the data amendment of the XML generated by SQL to XML method, use the JDOM to convert XML file to the Document object in the application.You can then traverse the structure to find, display and modify the appropriate information.

UACA Structures and Functions
The Unified Access Control Approach (UACA) consists of two subsystems: the unified data access interface system and the unified access control approach.Complete control of unified data access services to business database applications that access a central database is required, as this ensures that all business access to the data access service goes through the middle layer, achieving access to the database and centralized data access control.Additionally, it is in charge of optimization and transformation.Unified access controls services to complete the user authentication, access control, unify access interface services and integration services, and integrate data access with clients' applications using SDO, XML technologies.Additionally, it manages system communication using Technium Vol. 9, pp.26-40 (2023) ISSN: 2668-778X www.techniumscience.com the TCP/IP protocol to guarantee the correctness and stability of communication.Data utilizing XML is adaptable and compatible., as shown in Fig. 7. Fig. 7. UACA structures and functions

Implementation of Centralized Access Control System Process
Here, the session ID (SID) and the User Login that applies the log on details from the centralized database site that is consolidated and integrated from the system access control.The use from the user like password, name and login details from the Web site of the organization.
The verification of the user logging enterprise or company notifies the central database like the access control system and the user offering the SID of the user login details.Besides, there is also the web client calls program that offers the SID call information and the name through the user's computer and the browser like calls where the user computer is contained in the client's programs.By the client accessing the central database, there involves the data access of the control system that makes the port proxy request that receives in the specific process including the details involved.
The User's client program is able to access the central database from the central system database and the centralized access aimed at controlling the process from the client program that sends the requested data to the client.This process is known as SOCKET programming that applies TCP communication [21][22], as shown in Fig. 8.

User Login and Access to SID
Users logging services to log on into the central database site in host server.Using user name and password, users log on to the logging company's web site.They are verified by the user logging company's web site, which notifies the central database site control access system user login object that the user has logged in and access to the central database system of centralized access control object provides the user login session ID (SID) [23].

Web Client program calls
The web site for the client program provides the SID, well name and other call information via the browser of user's computer.The client program send a data request of a client access to the central database focused on data access control system made the port proxy object data request service.The format of data request followed by details.Client data requests sent and received the results of the specific process, followed by details.

Dealing with Client Data Sets Obtained
The clients focus from the central database access control system for data access used a port proxy object to receive the results of the client's requests.If the query is 'SELECT', then get the XML format of the result data set.If the query is 'INSERT/DELETE/UPDATE' get the result code as successful or failed operations.The format of the data request returns information, followed by details.Client data requests sent and received the results of the specific process, followed by details.The specific content of each tag, according to the actual situation changes return value conventions, as shown in Table 1.Here some request Format technique, as example: The implementation process steps in UACS with centralized access control system process see Fig. 9.

Users Login
To achieve easy connect (login) with UACA a special interface was designed, as shown in Fig. 12

Data Access Process, Analysis and Decision
The Case study is to design a unified interface to access the employee's data through UACA and achieve unified access, integration of data between the client application and source data, as shown in Figure 11.We have implemented queries on data processing and storage and get values depending on the size of data and execution time and analyzed the results.The costs query for data access processing and analysis, as shown in Table 2.We have decision evaluation this model with new technologies such as Apache Spark [24][25] and Hadoop MapReduce [25] in the feature work with issues of a time costs for large datasets analysis and process.

Conclusion
Designing software that can search through heterogeneous data and access data sources is a challenging endeavor since it necessitates managing a variety of issues, including query language support, data heterogeneity, and various access techniques.In this study, we suggested a SOA framework based on SDO that uses UACA to exchange and access diverse data sources.The framework's architecture components and the duties that agents should do were then represented.Additionally, restricted processes of user input, schema matching, metadata mapping, query creation, and execution have been defined for implementation.Without altering the existing model components, the UACA design allows for the addition of new model components as well as the development and improvement of SDO.In the future work to develop new service models to the

Fig. 9 .
Fig.9.Implementation process steps for UACA model and Fig.13 in Appendix A. The client user can used this interface to enter the initial connect such as IP address, PORT, and SID, more details as shown in Appendix A: • Precondition: o Connect details of host server (IP, PORT).o Generating a unique session ID (SID).o Activation network.• Trigger: o Users decide connect to server database.• Main success scenario: o User selects connect service from client application interface.o User enters the connect information (IP, PORT-SID).o User select connect button.o UACS send request to contact the database host server (Mid-Server) through socket server programming.o Host server sends response to UACA.o UACA view success message to user (Host severer is ready).• Exceptions o Problem in the network.o Host server is not known (IP or PORT) error.o State host server is busy or unknown.o User does not have the authority to contact to data source or SID is error.Sequence diagram of request connect to host server with UACA , see Figure 10.

Fig. 10 .
Fig. 10.A sequence steps for request connection to host server based on UACA.

Table 1
Return value conventions