An overview of post information warfare data recovery
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Self-Healing Workflow Systems under Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Design, Implementation, and Evaluation of A Repairable Database Management System
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Transaction fusion: a model for data recovery from information attacks
Journal of Intelligent Information Systems - Special issue: Database and applications security
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A Robust Damage Assessment Model for Corrupted Database Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Hi-index | 0.00 |
Data recovery techniques for malicious transactions are increasingly becoming an important issue since the security for DBMSs are mainly prevention based, and they cannot defend systems from unknown attacks. Survivability and availability are essential for modern DBMSs, which require the database provide continuous services in the period of recovery, namely dynamic recovery. In this paper, we presented a data recovery model and introduce extended read-write dependency and phantoms dependency to the model. A fine grained transaction log is proposed for data recovery. The log records all the data items of the read and update-involved operations for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. Based on the log, we develop a dynamic recovery system to implement the data recovery model. The system could provide continuous services while the recovery is processing. Experiments based on TPC-W benchmark show that the dynamic recovery system is high-efficient and reliable.