Efficient Damage Assessment and Repair in Resilient Distributed Database Systems

Preventive measures sometimes fail to defect malidous attacks. With cyber attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concem. The main objective of intrusion tolerant database systems is to detect attacks, and to assess and repair the damage caused by the attacks in a timely manner such that the database will not be damaged to such a degree that is unacceptable or useless. This paper focuses on effident damage assessment and repair in resilient distributed database systems. The complexity of distributed database systems caused by data partition, distributed transaction processing, and failures makes damage assessment and repair much more challenging than in centralized database systems. This paper identifies the key challenges and presents an effident algorithm for distributed damage assessment and repair.

[1]  Sushil Jajodia,et al.  Multilevel Secure Transaction Processing , 1999, Advances in Database Systems.

[2]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[3]  Bruce G. Lindsay,et al.  Transaction management in the R* distributed database management system , 1986, TODS.

[4]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[5]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[6]  Anita Borg,et al.  A message system supporting fault tolerance , 1983, SOSP '83.

[7]  Peng Liu,et al.  ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications , 2001, DBSec.

[8]  Brajendra Panda,et al.  Reconstructing the Database after Electronic Attacks , 1998, DBSec.

[9]  Lorenzo Alvisi,et al.  Reasons for a pessimistic or optimistic message logging protocol in MPI uncoordinated failure, recovery , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.

[10]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[11]  Sushil Jajodia,et al.  Using Checksums to Detect Data Corruption , 2000, EDBT.

[12]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[13]  Abraham Silberschatz,et al.  A Formal Approach to Recovery by Compensating Transactions , 1990, VLDB.

[14]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[15]  Sushil Jajodia,et al.  Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..