[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Robust Damage Assessment Model for Corrupted Database Systems

  • Conference paper
Information Systems Security (ICISS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5905))

Included in the following conference series:

Abstract

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Trans. Knowl. Data Eng. 14(5), 1167–1185 (2002)

    Article  Google Scholar 

  2. Luenam, P., Liu, P.: Odar: An on-the-fly damage assessment and repair system for commercial database applications. In: Olivier, M.S., Spooner, D.L. (eds.) DBSec. IFIP Conference Proceedings, vol. 215, pp. 239–252. Kluwer, Dordrecht (2001)

    Google Scholar 

  3. Chiueh, T.-c., Pilania, D.: Design, implementation, and evaluation of a repairable database management system. In: ICDE, pp. 1024–1035. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  4. Bai, K., Yu, M., Liu, P.: Trace: Zero-down-time database damage tracking, quarantine, and cleansing with negligible run-time overhead. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 161–176. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Lomet, D., Vagena, Z., Barga, R.: Recovery from ”bad” user transactions. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 337–346. ACM, New York (2006)

    Chapter  Google Scholar 

  6. cker Chiueh, T., Bajpai, S.: Accurate and efficient inter-transaction dependency tracking. In: ICDE, pp. 1209–1218. IEEE, Los Alamitos (2008)

    Google Scholar 

  7. Gollmann, D., Meier, J., Sabelfeld, A. (eds.): ESORICS 2006. LNCS, vol. 4189. Springer, Heidelberg (2006)

    Google Scholar 

  8. Panda, B., Haque, K.A.: Extended data dependency approach: a robust way of rebuilding database. In: SAC, pp. 446–452. ACM, New York (2002)

    Google Scholar 

  9. Yu, M., Liu, P., Zang, W., Jajodia, S.: Trusted recovery. Secure Data Management in Decentralized Systems 33, 59–94 (2007)

    Article  Google Scholar 

  10. Luenam, P., Liu, P.: Odam: An on-the-fly damage assessment and repair system for commercial database applications, pp. 446–452 (2003)

    Google Scholar 

  11. Yu, M., Zang, W., Liu, P.: Database isolation and filtering against data corruption attacks. In: ACSAC, pp. 97–106. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  12. Yu, M., Liu, P., Zang, W.: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications 32(1), 158–183 (2009)

    Article  Google Scholar 

  13. Zhu, H., Fu, G., Zhu, Y., Jin, R., Lü, K., Shi, J.: Dynamic data recovery for database systems based on fine grained transaction log. In: IDEAS 2008: Proceedings of the 2008 international symposium on Database engineering & applications, pp. 249–253. ACM, New York (2008)

    Chapter  Google Scholar 

  14. Xie, M., Zhu, H., Feng, Y., Hu, G.: Tracking and repairing damaged databases using before image table. In: FCST 2008: Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, Washington, DC, USA, pp. 36–41. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  15. Garcia-Molina, H., Ullman, J.D., Widom, J.D.: Database Systems: the Complete Book, 5th edn. Prentice Hall, Englewood Cliffs (2001)

    Google Scholar 

  16. Fayad, A., Jajodia, S., McCollum, C.D.: Application-level isolation using data inconsistency detection. In: ACSAC, pp. 119–126. IEEE Computer Society, Los Alamitos (1999)

    Google Scholar 

  17. Dameng: http://www.dameng.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fu, G., Zhu, H., Li, Y. (2009). A Robust Damage Assessment Model for Corrupted Database Systems. In: Prakash, A., Sen Gupta, I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10772-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10772-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10771-9

  • Online ISBN: 978-3-642-10772-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics