• DocumentCode
    2364094
  • Title

    Data hibernation framework in workflows under intrusion threat

  • Author

    Safdar, Sohail ; Hassan, Mohd Fadzil ; Qureshi, Muhammad Aasim ; Akbar, Rehan

  • Author_Institution
    Dept. of Comput. & Inf. Sci., Univ. Teknol. PETRONAS, Tronoh, Malaysia
  • fYear
    2011
  • fDate
    20-23 March 2011
  • Firstpage
    680
  • Lastpage
    685
  • Abstract
    The main objective of the research is to define and propose a framework for data hibernation in the workflows under intrusion threat. When the intrusion is detected, the data services need to be discontinued immediately to retain the security and the integrity of the valuable data, till the system is recovered from the threat. By discontinuing data services, the end users may face inconveniences in using the system because of its temporary unavailability. Data hibernation addresses a mechanism of secure transferring of data and providing an access of the data alternatively keeping the data integrity intact. Data hibernation involves three steps i.e. designing an alternate schema for storing data, transferring data to that alternate storage and providing an access to that data. Hence the system can continue to provide data services securely to the end user even in the threat situations.
  • Keywords
    security of data; Data hibernation framework; data services; intrusion threat; Availability; Data mining; Data models; Databases; Intrusion detection; Data Hibernation; Dimensions; IDS (Intrusion Detection System); System Availability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computers & Informatics (ISCI), 2011 IEEE Symposium on
  • Conference_Location
    Kuala Lumpur
  • Print_ISBN
    978-1-61284-689-7
  • Type

    conf

  • DOI
    10.1109/ISCI.2011.5958998
  • Filename
    5958998