Title :
An architecture for making data available ceaselessly during recovery
Author :
Valsangkar, Amit ; Panda, Brajendra
Author_Institution :
Arkansas Univ., Fayetteville, AR, USA
Abstract :
Existing recovery schemes, developed for defensive information warfare scenario, range from completely prohibiting access to affected databases to prohibiting access specifically to damaged data items. In many cases this prohibition is undesirable. We have introduced a recovery model that can substantially reduce the database down-time during the recovery process, while attempting to provide repaired data as accurately as possible. The mechanism itself is divided into two activities. The first activity is the process of gathering summary information about all the database attributes, which is an on going process throughout the lifetime of the database. The second activity which occurs during and after an attack is recognized, providing acceptable values for damaged data items instantaneously, effectively keeping the database available at all times.
Keywords :
computer crime; database management systems; system recovery; transaction processing; damaged data items; data recovery; database attributes; database down-time; defensive information warfare scenario; fuzzy values; information attacks; recovery process; Computer crime; Computer hacking; Data security; Database systems; Distributed databases; Information security; Protection; Safety; Transaction databases; USA Councils;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232421