Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang
{"title":"Fine Grained Transaction Log for Data Recovery in Database Systems","authors":"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang","doi":"10.1109/APTC.2008.7","DOIUrl":null,"url":null,"abstract":"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \"extended read operations\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APTC.2008.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of "extended read operations" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.