用于数据库系统数据恢复的细粒度事务日志

Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang
{"title":"用于数据库系统数据恢复的细粒度事务日志","authors":"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang","doi":"10.1109/APTC.2008.7","DOIUrl":null,"url":null,"abstract":"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \"extended read operations\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Fine Grained Transaction Log for Data Recovery in Database Systems\",\"authors\":\"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang\",\"doi\":\"10.1109/APTC.2008.7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \\\"extended read operations\\\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.\",\"PeriodicalId\":159186,\"journal\":{\"name\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APTC.2008.7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APTC.2008.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

攻击后恶意提交的事务的数据恢复日益成为一个重要的问题。数据恢复的损害评估需要一个事务日志,该日志记录了所有恶意和良性事务读取或写入的数据项。不幸的是,传统的撤销/重做日志不能记录事务的读操作;现有的审计机制无法捕获数据项的操作。本文引入了“扩展读操作”的概念,说明了扩展读操作是如何引起损害扩散的,并在此基础上提出了一种细粒度的事务日志(FGTL)。日志记录提交事务的只读和涉及更新的操作(读和写)的所有数据项,甚至提取SQL语句中的子查询读取的数据项。开发了一个原型系统,称为FGTL发生器,用于产生FGTL。基于TPC-W基准的实验证明了该方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Fine Grained Transaction Log for Data Recovery in Database Systems
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of "extended read operations" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
(How) Can We Manage the Trustworthiness of Security Infrastructures and Services? Mutual Information Based Watermarking Detection in Wavelet Domain for Copyright Protection Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6 Trusted Boot and Platform Trust Services on 1CD Linux
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1