Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology 2009
DOI: 10.1145/1516360.1516443
|View full text |Cite
|
Sign up to set email alerts
|

A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems

Abstract: Database security research aims to protect a database from unintended activities, such as authenticated misuse, malicious attacks. In recent years, surviving DBMS from an attack is becoming even more crucial because networks have become more open and the increasingly critical role that database servers are playing nowadays. Unlike the traditional database failure/attack recovery mechanisms, in this paper, we propose a light-weight dynamic Data Damage Tracking, Quarantine, and Recovery (DT QR) solution. We buil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…AIMS can be used as a middle-layer between the transactional database and the application to perform automatic intrusion response and recovery independently from the running applications. The most relevant work close to AIMS is given in [13], [10] that proposes an online damage tracking and quarantine mechanism to increase the survivability of single-tenant databases. The authors propose a multi-pass recovery procedure to ensure that all the corrupted data objects are recovered.…”
Section: Related Workmentioning
confidence: 99%
“…AIMS can be used as a middle-layer between the transactional database and the application to perform automatic intrusion response and recovery independently from the running applications. The most relevant work close to AIMS is given in [13], [10] that proposes an online damage tracking and quarantine mechanism to increase the survivability of single-tenant databases. The authors propose a multi-pass recovery procedure to ensure that all the corrupted data objects are recovered.…”
Section: Related Workmentioning
confidence: 99%
“…We often use PIMS k BFA, PIMS k BA, PIMS k RA, and PIMS k SA to differentiate between the assignment techniques as needed. The performance of PIMS is compared against PIMS 1 (denoted by One IB) and ITDB [21]. We use a workload of 5000 transactions to conduct the experiments, unless stated otherwise.…”
Section: Pims Performance Evaluationmentioning
confidence: 99%
“…In [5], a suite of recovery algorithms is proposed to unwind the effect of malicious transactions for offline and online recovery. In [6], [21], the authors present ITDB and DTQR, respectively, that implement the recovery algorithms in [5] on top of a Commercial-Off-The-Shelf DBMS. In [33], a damage assessment and repair system, termed Phoenix, is introduced.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the mechanism of maintaining a transaction dependency graph in the executing period, the process for recovery could be quite efficient. A prototype system Phoenix based on this model was also developed using PostgreSQL DBMS [11][12][13][14][15] . However, the model depends on the mechanism of Multi-Version Concurrency Control (MVCC) of the PostgreSQL DBMS and could not be applied to common database systems.…”
mentioning
confidence: 99%