Delivering Services with Integrity Guarantees in Survivable Database Systems
نویسندگان
چکیده
Current database survivability technologies focus on maintaining data integrity and availability in the face of attacks. They are very limited in satisfying differentiated information assurance requirements of various database services under sustained attacks. This paper takes the first steps towards delivering database services with information assurance guarantees. In particular, (a) we introduce the concept of Quality of Integrity Assurance(QoIA) services; (b) we present a data integrity model which allows customers or applications to quantitatively specify their integrity requirements on the services that they want the database system to deliver; and (c) we present an algorithm that can enable a database system to deliver a set of QoIA services without violating the integrity requirements specified by the customers on the set of services. Our approach can deliver integrity guarantees to database services, though sometimes some availability loss could be caused. Our approach can be easily integrated into our Intrusion Tolerant Database System(ITDB).
منابع مشابه
Survivable Information Storage Systems
A s society increasingly relies on digitally stored and accessed information, supporting the availability, integrity, and confidentiality of this information is crucial. We need systems in which users can securely store critical information, ensuring that it persists, is continuously accessible, cannot be destroyed, and is kept confidential. A survivable storage system would provide these guara...
متن کاملRequirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused increased attention on how to ensure network system survivability. Survivability is the capacity of a system to provide essential services even after successful intrusion and compromise, and to recover full services i...
متن کاملInformation Assurance
As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying th...
متن کاملEnhancing Survivability of Security Services using Redundancy
Traditional distributed system services that provide guarantees related to confidentiality, integrity, and authenticity enhance security, but are not survivable since each attribute is implemented by a single method. This paper advocates the use of redundancy to increase survivability by using multiple methods to implement each security attribute and doing so in ways that can vary unpredictably...
متن کاملImplementing a Tamper-Evident Database System
Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount of trusted client-side computation to achieve guarantees of integrity when interacting with a vulnerable or untrusted database server. To achieve this goal we describe a novel relational hash tree, designed for efficient databa...
متن کامل