期刊文献+

损坏容忍的数据查询降级服务机制 被引量:2

Damage-tolerant Date Query Degraded Service Mechanism
下载PDF
导出
摘要 传统的数据库安全机制重点关注数据的机密性,忽略了用户对数据库系统提供数据的完整性和可用性要求。为了提高系统数据的可用性和用户查询服务的满意度,提出了一种损坏容忍的数据查询降级服务机制。首先,在现有可生存性研究的基础上,引入降级服务的数据模型、数据完整度等相关概念,给出查询降级服务模型的定义;其次,根据该降级服务模型的定义给出相关的查询处理机制与具体查询算法,并从理论上证明该机制的正确性;最后,通过实验从查询执行性能的角度进一步说明该查询降级服务机制的有效性。 Traditional database security mechanism which focuses on the data confidentiality often overlooks the re- quirementd of data integrity and availability. This paper presented a Damage-Tolerant Data Query Degraded Service o(DT-DQDS) ,for improving system availability and user satisfaction of query operation. First, the model of the degraded servi-ce was given, which includes the definitions of data model and data integrity concept based on the existing study of survivability. Second, according to DT-DQDS model, data query mechanism and a concrete query algorithm were provid- ed, and the mechanism is validated theoretically. Finally, experimental results further demonstrate its good perfor-mance on the aspect of query execution efficiency.
出处 《计算机科学》 CSCD 北大核心 2013年第6期90-93,共4页 Computer Science
基金 国家自然基金项目(60673127) 国家863高技术计划项目(2007AA01Z404) 博士点基金项目(20103218110017)资助
关键词 数据库安全 数据库可生存性 数据库隔离 查询降级服务规则 Database security,Database survivability,Database isolation,Degraded query service rule
  • 相关文献

参考文献11

  • 1Bertino E,Sandhu R.Database security-concepts,approaches,and challenges[J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19.
  • 2Knight J C,Sullivan K J,Elder M C,et al.Survivability architectures:Issues and approaches[C]// DARPA Information Survivability Conference and Exposition,2000 DISCEX ' 00 Proceedings.2000:157-171.
  • 3Ammann P,Jajodia S,McCollum C D,et al.Surviving information warfare attacks on databases[C]// Security and Privacy,1997 Proceedings of IEEE Symposium on.1997:164-174.
  • 4Bai K,Liu P.A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems[C]//Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology.A CM,Saint Petersburg,Russia,2009:720-731.
  • 5Bai K,Yu M,Liu P.Trace:Zero-down-time database damage tracking,quarantine,and cleansing with negligible run-time overhead[C]//Proceedings of the 13th European Symposium on Research in Computer Security:Computer Security.SpringerVerlag,Málaga,Spain,2008:161-176.
  • 6Liu P,Jajodia S.Multi-phase damage confinement in database systems for intrusion tolerance[C]//Computer Security Foundations Workshop,2001.Proceedings.14th IEEE,2001:191-205.
  • 7Bai K,Liu P.Towards database firewall:Mining the damage spreading patterns[C]// Computer Security Applications Conference,ACSAC '06 22nd Annual.2006:449-462.
  • 8戴华,秦小麟,郑吉平,储惠.基于CTMO模型的数据库损坏数据隔离技术[J].计算机学报,2011,34(2):275-290. 被引量:2
  • 9谢美意,朱虹,冯玉才,胡贯荣.自修复数据库系统设计实现关键问题研究[J].小型微型计算机系统,2010,31(10):1926-1930. 被引量:2
  • 10付戈,时杰,李专,张国宾,胡红清,朱虹.一种有效的受损数据隔离方法[J].计算机科学与探索,2010,4(8):712-722. 被引量:2

二级参考文献30

  • 1钟勇,秦小麟.信息战条件下的数据库入侵限制和恢复技术[J].计算机科学,2005,32(7):78-82. 被引量:4
  • 2郑吉平,秦小麟,钟勇,孙瑾.基于SPN模型的可生存性DBMS中恶意事务修复算法的研究[J].计算机学报,2006,29(8):1480-1486. 被引量:11
  • 3Bai K,Liu P.A data damage tracking quarantine and recovery(DTQR)scheme for mission-critical database systems[C] //Kuznetsov S.Proceedings of 12th International Conference on Extending Database Technology.Saint Petersburg,Russia:ACM Press,2009:720-731.
  • 4Chiueh T,Bajpai S.Accurate and efficient inter-transaction dependency tracking[C] //Cilia M.Proceedings of24th International Conference on Data Engineering.Cancun,Mexico:IEEE Computer Society Press,2008:1209-1218.
  • 5Lin P,Wang H,Li L.Real-time data attack isolation for commercial database applications[J].Journal of Network and Computer Applications,2006,29(4):294-320.
  • 6Ammann P,Jajodia S,McCollum C D.Surviving information warfare attacks on databases[C] //Storms C.Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society Press,1997:164-174.
  • 7Ammann P,Jajodia S,Liu P.Recovery from malicious transactions[J].IEEE Transactions on Knowledge and Data Engineering,2002,14(5):1167-1185.
  • 8Bai K,Yu M,Liu P.Zero-down-time database damage tracking,quarantine,and cleansing with negligible run time overhead[C] //Jajodia S,Lopez J.Proceedings of13th European Symposium on Research in Computer Security.Málaga,Spain:Springer Press,2008:161-176.
  • 9Zhu H,Fu,G,Zhu Y,et al.Dynamic data recovery for database systems based on fine grained transaction log[C] //Bernardino J,Desai B C.Proceedings of 12th International Symposium on Database Engineering and Applications.Coimbra,Portugal:ACM Press,2008:249-253.
  • 10Liu P,Jajodia S,McCollum C D.Intrusion confinement by isolation in information systems[J].Journal of Computer Security,2000,8(4):243-279.

共引文献3

同被引文献17

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部