Abstract
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Trans. Knowl. Data Eng. 14(5), 1167–1185 (2002)
Luenam, P., Liu, P.: Odar: An on-the-fly damage assessment and repair system for commercial database applications. In: Olivier, M.S., Spooner, D.L. (eds.) DBSec. IFIP Conference Proceedings, vol. 215, pp. 239–252. Kluwer, Dordrecht (2001)
Chiueh, T.-c., Pilania, D.: Design, implementation, and evaluation of a repairable database management system. In: ICDE, pp. 1024–1035. IEEE Computer Society, Los Alamitos (2005)
Bai, K., Yu, M., Liu, P.: Trace: Zero-down-time database damage tracking, quarantine, and cleansing with negligible run-time overhead. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 161–176. Springer, Heidelberg (2008)
Lomet, D., Vagena, Z., Barga, R.: Recovery from ”bad” user transactions. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 337–346. ACM, New York (2006)
cker Chiueh, T., Bajpai, S.: Accurate and efficient inter-transaction dependency tracking. In: ICDE, pp. 1209–1218. IEEE, Los Alamitos (2008)
Gollmann, D., Meier, J., Sabelfeld, A. (eds.): ESORICS 2006. LNCS, vol. 4189. Springer, Heidelberg (2006)
Panda, B., Haque, K.A.: Extended data dependency approach: a robust way of rebuilding database. In: SAC, pp. 446–452. ACM, New York (2002)
Yu, M., Liu, P., Zang, W., Jajodia, S.: Trusted recovery. Secure Data Management in Decentralized Systems 33, 59–94 (2007)
Luenam, P., Liu, P.: Odam: An on-the-fly damage assessment and repair system for commercial database applications, pp. 446–452 (2003)
Yu, M., Zang, W., Liu, P.: Database isolation and filtering against data corruption attacks. In: ACSAC, pp. 97–106. IEEE Computer Society, Los Alamitos (2007)
Yu, M., Liu, P., Zang, W.: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications 32(1), 158–183 (2009)
Zhu, H., Fu, G., Zhu, Y., Jin, R., Lü, K., Shi, J.: Dynamic data recovery for database systems based on fine grained transaction log. In: IDEAS 2008: Proceedings of the 2008 international symposium on Database engineering & applications, pp. 249–253. ACM, New York (2008)
Xie, M., Zhu, H., Feng, Y., Hu, G.: Tracking and repairing damaged databases using before image table. In: FCST 2008: Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, Washington, DC, USA, pp. 36–41. IEEE Computer Society, Los Alamitos (2008)
Garcia-Molina, H., Ullman, J.D., Widom, J.D.: Database Systems: the Complete Book, 5th edn. Prentice Hall, Englewood Cliffs (2001)
Fayad, A., Jajodia, S., McCollum, C.D.: Application-level isolation using data inconsistency detection. In: ACSAC, pp. 119–126. IEEE Computer Society, Los Alamitos (1999)
Dameng: http://www.dameng.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, G., Zhu, H., Li, Y. (2009). A Robust Damage Assessment Model for Corrupted Database Systems. In: Prakash, A., Sen Gupta, I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10772-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-10772-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10771-9
Online ISBN: 978-3-642-10772-6
eBook Packages: Computer ScienceComputer Science (R0)