{"title":"A log independent distributed database damage assessment model","authors":"Jing Zhou, B. Panda, Y. Hu","doi":"10.1109/IAW.2005.1495967","DOIUrl":null,"url":null,"abstract":"In a distributed database system, damage assessment after an information attack is a complicated task due to intricate transaction relationships among distributed sites. In these systems, when any sub-transaction reads a damaged data at any site the entire transaction of which the sub-transaction is a part is considered affected by the damage. Hence, the data items updated by that transaction irrespective of sites are also considered damaged. To control spread of damage, accurate damage assessment and appropriate recovery procedures must be performed as soon as an attack is detected. This research focuses on damage assessment procedures for distributed database systems and uses pre-developed data structures for fast and accurate result. The method presented in this paper quickly identifies all affected transactions and all damaged data items without any log access.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In a distributed database system, damage assessment after an information attack is a complicated task due to intricate transaction relationships among distributed sites. In these systems, when any sub-transaction reads a damaged data at any site the entire transaction of which the sub-transaction is a part is considered affected by the damage. Hence, the data items updated by that transaction irrespective of sites are also considered damaged. To control spread of damage, accurate damage assessment and appropriate recovery procedures must be performed as soon as an attack is detected. This research focuses on damage assessment procedures for distributed database systems and uses pre-developed data structures for fast and accurate result. The method presented in this paper quickly identifies all affected transactions and all damaged data items without any log access.