Reorganization of the database log for information warfare data recovery

  • Authors:
  • Rumman Sobhan;Brajendra Panda

  • Affiliations:
  • Computer Science Department, University of North Dakota;Computer Science Department, University of North Dakota

  • Venue:
  • Das'01 Proceedings of the fifteenth annual working conference on Database and application security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical or logical operations associated with an update, a complete damage assessment and repair of the database is not possible in the post Information Warfare scenario. In this research, a new logging protocol is proposed which records all appropriate information required for the complete repair of a database that was updated by committed but affected transactions. This information includes various predicates and statements used in the transaction. An algorithm to incorporate these in the log is offered. Based on this new log, a method to perform damage assessment and recovery is presented.