期刊文献+

Dynamic Damage Recovery for Web Databases

Dynamic Damage Recovery for Web Databases
原文传递
导出
摘要 In the web context, there is an urgent need for a self-healing database system which has the ability to automatically locate and undo a set of transactions that are corrupted by malicious attacks. The metrics of survivability and availability require a database to provide continuous services during the period of recovery, which is referred to as dynamic recovery. In this paper, we present that an extended read operation from a corrupted data would cause damage spreading. We build a fine grained transaction log to record the extended read and write operations while user transactions are processing. Based on that, we propose a dynamic recovery system to implement the damage repair. The system captures damage spreading caused by extended read-write dependency between transactions. It also retains the execution results for blind write transactions and gives a solution to the issues of recovery conflicts caused by forward recovery. Moreover, a confinement activity is imposed on the in-repairing data to prevent a further damage propagation while the data recovery is processing. The performance evaluation in our experiments shows that the system is reliable and highly efficient. In the web context, there is an urgent need for a self-healing database system which has the ability to automatically locate and undo a set of transactions that are corrupted by malicious attacks. The metrics of survivability and availability require a database to provide continuous services during the period of recovery, which is referred to as dynamic recovery. In this paper, we present that an extended read operation from a corrupted data would cause damage spreading. We build a fine grained transaction log to record the extended read and write operations while user transactions are processing. Based on that, we propose a dynamic recovery system to implement the damage repair. The system captures damage spreading caused by extended read-write dependency between transactions. It also retains the execution results for blind write transactions and gives a solution to the issues of recovery conflicts caused by forward recovery. Moreover, a confinement activity is imposed on the in-repairing data to prevent a further damage propagation while the data recovery is processing. The performance evaluation in our experiments shows that the system is reliable and highly efficient.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期548-561,共14页 计算机科学技术学报(英文版)
基金 Supported by the National Hi-Tech Research and Development 863 program of China under Grant No. 2006AA01Z430
关键词 dynamic recovery SURVIVABILITY AVAILABILITY dynamic recovery, survivability, availability
  • 相关文献

参考文献19

  • 1Liu P. Architectures for intrusion tolerant database systems. In Proc. the 18th Annual Computer Security Applications Conference, Las Vegas, USA, Dec. 9-13, 2002, pp.311-322.
  • 2Ammann P, Jajodia S, Liu P. Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering, 2002, 14(5): 1167-1185.
  • 3Yu M, Liu P, Zang W. Self-healing workflow systems under attacks. In Proc. 24th International Conference on Distributed Computing Systems (ICDCS2004), Tokyo, Japan, Mar. 24- 26, 2004, pp.418-425.
  • 4Wang H, Liu P. Modeling and evaluating the survivability of an intrusion tolerant database-system. In Proc. 11th European Symposium on Research in Computer Security, Hamburg, Germany, Sept. 18-20, 2006, pp.207-224.
  • 5Panda B, Giordano J. An overview of post inibrmation warfare data recovery. In Proc. ACM Symposium on Applied Computing (SAC1998), Atlanta, USA, Feb. 27-Max. 1, 1998, pp.253-254.
  • 6Liu P, AmmaJan P, Jajodia S. Rewriting histories: Recovering from malicious transactions. Distrib. Parallel Databases, 2000, 8(1): 7-40.
  • 7Pilania D, Chiueh T. Design, implementation, and evaluation of an intrusion-resilient database system. Technical Report TR-123, Computer Science Department, State Univ. New York at Stony Brook, 2002.
  • 8Rajesh Y, Panda B. Transaction fusion: A model for data recovery from information attacks. Journal of Intelligent Information Systems Attacks, 2004, 23(3): 225-245.
  • 9Ammann p, Jajodia S, McCollum C D. Surviving information warfare attacks on databases. In Proc. IEEE Symposium on Security and Privacy, Oakland, USA, May 3-6, 1997, p.164.
  • 10Fu G, Zhu H, Feng Y. Fine grained transaction log for data recovery in database systems. In Proc. the 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, Wuhan, China, Oct. 14-17, 2008, pp.123-131.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部