Computer Science ›› 2013, Vol. 40 ›› Issue (6): 90-93.

Previous Articles     Next Articles

Damage-tolerant Date Query Degraded Service Mechanism

LI Ling,QIN Xiao-lin and DAI Hua   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Traditional database security mechanism which focuses on the data confidentiality often overlooks the requirementd of data integrity and availability.This paper presented a Damage-Tolerant Data Query Degraded Service (DT-DQDS),for improving system availability and user satisfaction of query operation.First,the model of the degraded servi-ce was given,which includes the definitions of data model and data integrity concept based on the existing study of survivability.Second,according to DT-DQDS model,data query mechanism and a concrete query algorithm were provided,and the mechanism is validated theoretically.Finally,experimental results further demonstrate its good perfor-mance on the aspect of query execution efficiency.

Key words: Database security,Database survivability,Database isolation,Degraded query service rule

[1] Bertino E,Sandhu R.Database security-concepts,approaches,and challenges [J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19
[2] 刘启原,刘怡.数据库与信息系统的安全 [M].北京:科学出版社,2000
[3] 张敏,徐震,冯登国.数据库安全 [M].北京:科学出版社,2005
[4] Knight J C,Sullivan K J,Elder M C,et al.Survivability architectures:Issues and approaches [C]∥ DARPA Information Survivability Conference and Exposition,2000DISCEX ’00Proceedings.2000:157-171
[5] Ammann P,Jajodia S,McCollum C D,et al.Surviving information warfare attacks on databases [C]∥Security and Privacy,1997Proceedings of IEEE Symposium on.1997:164-174
[6] Bai K,Liu P.A data damage tracking quarantine and recovery(DTQR) scheme for mission-critical database systems [C]∥Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology.ACM,Saint Petersburg,Russia,2009:720-731
[7] Bai K,Yu M,Liu P.Trace:Zero-down-time database damagetracking,quarantine,and cleansing with negligible run-time overhead [C]∥Proceedings of the 13th European Symposium on Research in Computer Security:Computer Security.Springer-Verlag,Málaga,Spain,2008:161-176
[8] Liu P,Jajodia S.Multi-phase damage confinement in databasesystems for intrusion tolerance [C]∥Computer Security Foundations Workshop,2001.Proceedings.14th IEEE,2001:191-205
[9] Bai K,Liu P.Towards database firewall:Mining the damagespreading patterns [C]∥Computer Security Applications Conference,ACSAC ’0622nd Annual.2006:449-462
[10] 戴华,秦小麟,郑吉平.基于CTMO模型的数据库损坏数据隔离技术 [J].计算机学报,2011,34(2):275-290
[11] 谢美意,朱虹,冯玉才,等.自修复数据库系统设计实现关键问题研究 [J].小型微型计算机系统,2010(10):1926-1930
[12] 付戈,时杰,李专,等.一种有效的受损数据隔离方法 [J].计算机科学与探索,2010(8):712-722
[13] Dai H,Qin X,Zheng G,et al.SQRM:An Effective Solution to Suspicious Users in Database[C]∥Processding of 3rd International Conference on Advances in Databases,Knowledge,and Data Applications.2011:59-64

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!