Recovery of data integrity under multi-tier architectures

Recovery from attacks has been extensively studied at the database transaction level and the application level in recent years. To recover compromised database transactions, compensating and redoing the compromised database transactions need to be conducted under the concurrency control restrictions. Under a multi-tier service architecture, at the application level, attack recovery has more restrictions introduced by either control dependencies among application activities or application specifications. Thus, the multi-tier service architecture introduces more challenges to the attack recovery problem. In this study, the authors describe the recovery problems with a multi-layer dependency graph (MLDG). They also describe the techniques of damage assessment and recovery based on an MLDG.

[1]  Peng Liu,et al.  Self-healing workflow systems under attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[2]  Abraham Silberschatz,et al.  A Formal Approach to Recovery by Compensating Transactions , 1990, VLDB.

[3]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[4]  Roger S. Barga,et al.  Recovery from "bad" user transactions , 2006, SIGMOD Conference.

[5]  Sushil Jajodia,et al.  Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..

[6]  Ying Wang,et al.  The Design and Implementation of a Self-Healing Database System , 2004, Journal of Intelligent Information Systems.

[7]  Sushil Jajodia,et al.  Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.

[8]  Peng Liu,et al.  The implementation and evaluation of a recovery system for workflows , 2009, J. Netw. Comput. Appl..

[9]  Peng Liu,et al.  TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead , 2008, ESORICS.

[10]  Tzi-cker Chiueh,et al.  Design, implementation, and evaluation of a repairable database management system , 2004, 20th Annual Computer Security Applications Conference.

[11]  Brajendra Panda,et al.  Reconstructing the Database after Electronic Attacks , 1998, DBSec.

[12]  Gustavo Alonso,et al.  Atomicity and isolation for transactional processes , 2002, TODS.

[13]  T. Chiueh,et al.  Design, Implementation, and Evaluation of a Repairable Database Management System , 2005, ICDE.