Distributed Database System Security Model of Power Enterprise Based on Intrusion Tolerance Technology

This paper presents an intrusion-tolerant distributed database system security model of power enterprise. While traditional secure distributed database systems depend on preventive measures and are limited in surviving malicious attacks, this model can detect intrusions, isolate attacks, assess and repair the damage caused by intrusions in a timely manner. In this way, the system can maintain the integrity and availability of data. As for confidential data, a (t, n) threshold secret share scheme is utilized to protect them from compromised servers in the presence of intrusions. In this way, the system can realize the confidentiality of data.

[1]  Sushil Jajodia,et al.  Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..

[2]  Peng Liu Engineering a distributed intrusion tolerant database system using COTS components , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[3]  Q Lu Digital Power System-The Power System Technological Trend in the New Century , 2000 .

[4]  Hao Xu,et al.  Efficient Damage Assessment and Repair in Resilient Distributed Database Systems , 2001, DBSec.

[5]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[6]  Sushil Jajodia,et al.  Application-level isolation to cope with malicious database users , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[7]  Brajendra Panda,et al.  Reconstructing the Database after Electronic Attacks , 1998, DBSec.

[8]  Peng Liu Architectures for intrusion tolerant database systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].