TY - GEN
T1 - Delivering services with integrity guarantees in survivable database systems
AU - Zhang, Jianyong
AU - Liu, Peng
PY - 2004/1/1
Y1 - 2004/1/1
N2 - Current database survivability technologies focus on maintaining data integrity and availability in the face of attacks. They are very limited in satisfying differentiated information assurance requirements of various database services under sustained attacks. This paper takes the first steps towards delivering database services with information assurance guarantees. In particular, (a) we introduce the concept of Quality of Integrity Assurance(QoIA) services; (b) we present a data integrity model which allows customers or applications to quantitatively specify their integrity requirements on the services that they want the database system to deliver; and (c) we present an algorithm that can enable a database system to deliver a set of QoIA services without violating the integrity requirements specified by the customers on the set of services. Our approach can deliver integrity guarantees to database services, though sometimes some availability loss could be caused. Our approach can be easily integrated into our Intrusion Tolerant Database System(ITDB).
AB - Current database survivability technologies focus on maintaining data integrity and availability in the face of attacks. They are very limited in satisfying differentiated information assurance requirements of various database services under sustained attacks. This paper takes the first steps towards delivering database services with information assurance guarantees. In particular, (a) we introduce the concept of Quality of Integrity Assurance(QoIA) services; (b) we present a data integrity model which allows customers or applications to quantitatively specify their integrity requirements on the services that they want the database system to deliver; and (c) we present an algorithm that can enable a database system to deliver a set of QoIA services without violating the integrity requirements specified by the customers on the set of services. Our approach can deliver integrity guarantees to database services, though sometimes some availability loss could be caused. Our approach can be easily integrated into our Intrusion Tolerant Database System(ITDB).
UR - http://www.scopus.com/inward/record.url?scp=84902474999&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84902474999&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84902474999
SN - 1402080697
SN - 9781402080692
T3 - IFIP Advances in Information and Communication Technology
SP - 33
EP - 46
BT - Data and Applications Security XVII
PB - Springer New York LLC
T2 - IFIP TC11 / WG11.3 17th Annual Working Conference on Data and Applications Security
Y2 - 4 August 2003 through 6 August 2003
ER -