loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Theppatorn Rhujittawiwat 1 ; John Ravan 1 ; Ahmed Saaudi 1 ; Shankar Banik 2 and Csilla Farkas 1

Affiliations: 1 Computer Science & Engineering Dept., University of South Carolina, Columbia, SC, U.S.A. ; 2 Dept. of Mathematics and Computer Science, The Citadel, The Military College of South Carolina, Charleston, SC, U.S.A.

Keyword(s): Database, Malicious Transaction, Security, Dependency Graph, Data Provenance.

Abstract: In this paper, we propose a solution to recover a database from the effects of malicious transactions. The traditional approach for recovery is to execute all non-malicious transactions from a consistent rollback point. However, this approach is inefficient. First, the database will be unavailable until the restoration is finished. Second, all non-malicious transactions that committed after the rollback state need to be re-executed. The intuition for our approach is to re-execute partial transactions, i.e., only the operations that were affected by the malicious transactions. We develop algorithms to reduce the downtime of the database during recovery process. We show that our solution is 1.) Complete, i.e., all the effects of the malicious transactions are removed, 2.) Sound, i.e., all the effects of non-malicious transactions are preserved, and 3.) Minimal, i.e., only affected data items are modified. We also show that our algorithms preserve conflict serializability of the transac tion execution history. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.118.200.136

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Rhujittawiwat, T.; Ravan, J.; Saaudi, A.; Banik, S. and Farkas, C. (2021). Database Recovery from Malicious Transactions: A Use of Provenance Information. In Proceedings of the 10th International Conference on Data Science, Technology and Applications - DATA; ISBN 978-989-758-521-0; ISSN 2184-285X, SciTePress, pages 39-48. DOI: 10.5220/0010553900390048

@conference{data21,
author={Theppatorn Rhujittawiwat. and John Ravan. and Ahmed Saaudi. and Shankar Banik. and Csilla Farkas.},
title={Database Recovery from Malicious Transactions: A Use of Provenance Information},
booktitle={Proceedings of the 10th International Conference on Data Science, Technology and Applications - DATA},
year={2021},
pages={39-48},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010553900390048},
isbn={978-989-758-521-0},
issn={2184-285X},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Data Science, Technology and Applications - DATA
TI - Database Recovery from Malicious Transactions: A Use of Provenance Information
SN - 978-989-758-521-0
IS - 2184-285X
AU - Rhujittawiwat, T.
AU - Ravan, J.
AU - Saaudi, A.
AU - Banik, S.
AU - Farkas, C.
PY - 2021
SP - 39
EP - 48
DO - 10.5220/0010553900390048
PB - SciTePress