Database Recovery from Malicious Transactions: A Use of Provenance Information
Theppatorn Rhujittawiwat, John Ravan, Ahmed Saaudi, Shankar Banik, Csilla Farkas
2021
Abstract
In this paper, we propose a solution to recover a database from the effects of malicious transactions. The traditional approach for recovery is to execute all non-malicious transactions from a consistent rollback point. However, this approach is inefficient. First, the database will be unavailable until the restoration is finished. Second, all non-malicious transactions that committed after the rollback state need to be re-executed. The intuition for our approach is to re-execute partial transactions, i.e., only the operations that were affected by the malicious transactions. We develop algorithms to reduce the downtime of the database during recovery process. We show that our solution is 1.) Complete, i.e., all the effects of the malicious transactions are removed, 2.) Sound, i.e., all the effects of non-malicious transactions are preserved, and 3.) Minimal, i.e., only affected data items are modified. We also show that our algorithms preserve conflict serializability of the transaction execution history.
DownloadPaper Citation
in Harvard Style
Rhujittawiwat T., Ravan J., Saaudi A., Banik S. and Farkas C. (2021). Database Recovery from Malicious Transactions: A Use of Provenance Information. In Proceedings of the 10th International Conference on Data Science, Technology and Applications - Volume 1: DATA, ISBN 978-989-758-521-0, pages 39-48. DOI: 10.5220/0010553900390048
in Bibtex Style
@conference{data21,
author={Theppatorn Rhujittawiwat and John Ravan and Ahmed Saaudi and Shankar Banik and Csilla Farkas},
title={Database Recovery from Malicious Transactions: A Use of Provenance Information},
booktitle={Proceedings of the 10th International Conference on Data Science, Technology and Applications - Volume 1: DATA,},
year={2021},
pages={39-48},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010553900390048},
isbn={978-989-758-521-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Data Science, Technology and Applications - Volume 1: DATA,
TI - Database Recovery from Malicious Transactions: A Use of Provenance Information
SN - 978-989-758-521-0
AU - Rhujittawiwat T.
AU - Ravan J.
AU - Saaudi A.
AU - Banik S.
AU - Farkas C.
PY - 2021
SP - 39
EP - 48
DO - 10.5220/0010553900390048