Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A formal approach to recovery by compensating transactions
Proceedings of the sixteenth international conference on Very large databases
ACM Transactions on Database Systems (TODS)
Fundamentals of database systems (2nd ed.)
Fundamentals of database systems (2nd ed.)
A survey of intrusion detection techniques
Computers and Security
Communications of the ACM
Communications of the ACM
Communications of the ACM
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Reconstructing the Database after Electronic Attacks
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Efficient damage assessment and repair in resilient distributed database systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Evaluating damage from cyber attacks: a model and analysis
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Dynamic data recovery for database systems based on fine grained transaction log
IDEAS '08 Proceedings of the 2008 international symposium on Database engineering & applications
Dynamic damage recovery for web databases
Journal of Computer Science and Technology
Enhanced insider threat detection model that increases data availability
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Hi-index | 0.00 |
The escalation of electronic attacks on databases in recent times demands fast and efficient recovery methods. The existing recovery techniques are too time-consuming as they first undo all malicious and affected transactions individually, and then redo all affected transactions, again, individually. In this paper, we propose a method that accelerates the undo and redo phases of the recovery. The method developed involves combining or fusing malicious or affected transactions occurring in groups. These fused transactions are executed during undo and redo phases instead of execution of individual transactions. By fusing relevant transactions into a single transaction, the number of operations such as start, commit, read, and write are minimized. Thus, data items which were required to be accessed multiple times in case of individual transactions are accessed only once in a fused transaction. The amount of log I/O's is reduced. This expedites the recovery procedure in the event of information attacks. A simulation analysis of the proposed model confirmed our claim.