Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang
{"title":"用于数据库系统数据恢复的细粒度事务日志","authors":"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang","doi":"10.1109/APTC.2008.7","DOIUrl":null,"url":null,"abstract":"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \"extended read operations\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Fine Grained Transaction Log for Data Recovery in Database Systems\",\"authors\":\"Ge Fu, Hong Zhu, Yu-cai Feng, Yi Zhu, Jie Shi, Min Chen, X. Wang\",\"doi\":\"10.1109/APTC.2008.7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of \\\"extended read operations\\\" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.\",\"PeriodicalId\":159186,\"journal\":{\"name\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APTC.2008.7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APTC.2008.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fine Grained Transaction Log for Data Recovery in Database Systems
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture operations for data items. In this paper, we introduce a concept of "extended read operations" and illustrate how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed. The log records all the data items of the read only and update-involved operations (read and write) for the committed transactions, and even extracts data items read by the subqueries in the SQL statements. A prototype system denoted FGTL generator is developed to generate the FGTL. Experiments based on TPC-W benchmark show the availability for FGTL generator.