Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
12-2009
Abstract
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.
Keywords
Data integrity, database recovery, damage assessment
Discipline
Databases and Information Systems | Data Storage Systems
Research Areas
Cybersecurity
Publication
Proceedings of the 5th International Conference on Information Systems Security, Calcutta, India, 2009 December 14-18
First Page
237
Last Page
251
ISBN
9783642107719
Identifier
10.1007/978-3-642-10772-6_18
Publisher
Springer Verlag
City or Country
Calcutta, India
Citation
FU, Ge; ZHU, Hong; and LI, Yingjiu.
A robust damage assessment model for corrupted database systems. (2009). Proceedings of the 5th International Conference on Information Systems Security, Calcutta, India, 2009 December 14-18. 237-251.
Available at: https://ink.library.smu.edu.sg/sis_research/4177
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/978-3-642-10772-6_18