DocumentCode :
1707394
Title :
A log independent distributed database damage assessment model
Author :
Zhou, Jing ; Panda, Brajendra ; Hu, Yi
Author_Institution :
Comput. Sci. & Comput. Eng. Dept., Arkansas Univ., Fayetteville, AR, USA
fYear :
2005
Firstpage :
302
Lastpage :
309
Abstract :
In a distributed database system, damage assessment after an information attack is a complicated task due to intricate transaction relationships among distributed sites. In these systems, when any sub-transaction reads a damaged data at any site the entire transaction of which the sub-transaction is a part is considered affected by the damage. Hence, the data items updated by that transaction irrespective of sites are also considered damaged. To control spread of damage, accurate damage assessment and appropriate recovery procedures must be performed as soon as an attack is detected. This research focuses on damage assessment procedures for distributed database systems and uses pre-developed data structures for fast and accurate result. The method presented in this paper quickly identifies all affected transactions and all damaged data items without any log access.
Keywords :
data structures; distributed databases; security of data; transaction processing; data damage; data structures; distributed database; information attack; log independent damage assessment model; malicious transaction; transaction relationship; Computer science; Data security; Data structures; Database systems; Distributed databases; Information security; Information systems; Intrusion detection; Transaction databases; USA Councils;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN :
0-7803-9290-6
Type :
conf
DOI :
10.1109/IAW.2005.1495967
Filename :
1495967
Link To Document :
بازگشت