{"title":"Performance vs. security: Implementing an immutable database in MySQL","authors":"Thomas Nash, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356402","DOIUrl":null,"url":null,"abstract":"Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICITST.2017.8356402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.