计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 90-93.

• 信息安全 • 上一篇    下一篇

损坏容忍的数据查询降级服务机制

李玲,秦小麟,戴华   

  1. 南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016;南京邮电大学计算机学院 南京210003
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然基金项目(60673127),国家863高技术计划项目(2007AA01Z404),博士点基金项目(20103218110017)资助

Damage-tolerant Date Query Degraded Service Mechanism

LI Ling,QIN Xiao-lin and DAI Hua   

  • Online:2018-11-16 Published:2018-11-16

摘要: 传统的数据库安全机制重点关注数据的机密性,忽略了用户对数据库系统提供数据的完整性和可用性要求。为了提高系统数据的可用性和用户查询服务的满意度,提出了一种损坏容忍的数据查询降级服务机制。首先,在现有可生存性研究的基础上,引入降级服务的数据模型、数据完整度等相关概念,给出查询降级服务模型的定义;其次,根据该降级服务模型的定义给出相关的查询处理机制与具体查询算法,并从理论上证明该机制的正确性;最后,通过实验从查询执行性能的角度进一步说明该查询降级服务机制的有效性。

关键词: 数据库安全,数据库可生存性,数据库隔离,查询降级服务规则

Abstract: Traditional database security mechanism which focuses on the data confidentiality often overlooks the requirementd of data integrity and availability.This paper presented a Damage-Tolerant Data Query Degraded Service (DT-DQDS),for improving system availability and user satisfaction of query operation.First,the model of the degraded servi-ce was given,which includes the definitions of data model and data integrity concept based on the existing study of survivability.Second,according to DT-DQDS model,data query mechanism and a concrete query algorithm were provided,and the mechanism is validated theoretically.Finally,experimental results further demonstrate its good perfor-mance on the aspect of query execution efficiency.

Key words: Database security,Database survivability,Database isolation,Degraded query service rule

[1] Bertino E,Sandhu R.Database security-concepts,approaches,and challenges [J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19
[2] 刘启原,刘怡.数据库与信息系统的安全 [M].北京:科学出版社,2000
[3] 张敏,徐震,冯登国.数据库安全 [M].北京:科学出版社,2005
[4] Knight J C,Sullivan K J,Elder M C,et al.Survivability architectures:Issues and approaches [C]∥ DARPA Information Survivability Conference and Exposition,2000DISCEX ’00Proceedings.2000:157-171
[5] Ammann P,Jajodia S,McCollum C D,et al.Surviving information warfare attacks on databases [C]∥Security and Privacy,1997Proceedings of IEEE Symposium on.1997:164-174
[6] Bai K,Liu P.A data damage tracking quarantine and recovery(DTQR) scheme for mission-critical database systems [C]∥Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology.ACM,Saint Petersburg,Russia,2009:720-731
[7] Bai K,Yu M,Liu P.Trace:Zero-down-time database damagetracking,quarantine,and cleansing with negligible run-time overhead [C]∥Proceedings of the 13th European Symposium on Research in Computer Security:Computer Security.Springer-Verlag,Málaga,Spain,2008:161-176
[8] Liu P,Jajodia S.Multi-phase damage confinement in databasesystems for intrusion tolerance [C]∥Computer Security Foundations Workshop,2001.Proceedings.14th IEEE,2001:191-205
[9] Bai K,Liu P.Towards database firewall:Mining the damagespreading patterns [C]∥Computer Security Applications Conference,ACSAC ’0622nd Annual.2006:449-462
[10] 戴华,秦小麟,郑吉平.基于CTMO模型的数据库损坏数据隔离技术 [J].计算机学报,2011,34(2):275-290
[11] 谢美意,朱虹,冯玉才,等.自修复数据库系统设计实现关键问题研究 [J].小型微型计算机系统,2010(10):1926-1930
[12] 付戈,时杰,李专,等.一种有效的受损数据隔离方法 [J].计算机科学与探索,2010(8):712-722
[13] Dai H,Qin X,Zheng G,et al.SQRM:An Effective Solution to Suspicious Users in Database[C]∥Processding of 3rd International Conference on Advances in Databases,Knowledge,and Data Applications.2011:59-64

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!