to re-execute a transaction. The time required by our
solution will be bounded by Time = r(t
reexecute
). The
time required by re-executing all transactions will be
bounded by Time = n(t
reexecute
). Thus, our solution
can perform faster on the assumptions that r < n and
the processes in our algorithms requires substantially
less time than the re-execution process.
5 CONCLUSIONS & FUTURE
WORK
As the numbers and sophistication of attacks against
databases increase, it is necessary to support effi-
cient and correct recovery from malicious transac-
tions. The solution presented in this paper provides
an efficient an correct solution to recover from ma-
licious transactions. This increases the availability
of the system without dramatically decreasing perfor-
mance. We showed that our solution also preserves
conflict serializability.
Our ongoing work extends our results to reduce
the number of malicious transactions that affect the
database. Our approach is to combine snapshot iso-
lation with data provenance. Our provenance data
incorporates snapshot isolation to predict transaction
behavior. The transaction scheduler can use this in-
formation to prioritize transactions and block poten-
tial malicious transactions.
ACKNOWLEDGEMENT
This project was partially supported by the NCAE-C
Cyber Curriculum and Research 2020 Program.
REFERENCES
A. Chakraborty, A. K. Majumdar, and S. Sural (2010). A
column dependency-based approach for static and dy-
namic recovery of databases from malicious transac-
tions. International Journal of Information Security,
9(1):51–67.
Ammann, P., Jajodia, S., and Liu, P. (2002). Recovery from
malicious transactions. IEEE Transactions on Knowl-
edge and Data Engineering, 14(5):1167–1185.
Backes, M., Grimm, N., and Kate, A. (2016). Data lineage
in malicious environments. IEEE Transactions on De-
pendable and Secure Computing, 13(2):178–191.
Bissell, K., Lasalle, R., and Paolo, D. C. (2019). 2019 Cost
of Cybercrime Study | 9th Annual | Accenture.
Chandra, R., Kim, T., Shah, M., Narula, N., and Zeldovich,
N. (2011). Intrusion recovery for database-backed
web applications. In Proceedings of the Twenty-Third
ACM Symposium on Operating Systems Principles,
SOSP ’11, pages 101–114, New York, NY, USA. As-
sociation for Computing Machinery.
Chandra, R., Kim, T., and Zeldovich, N. (2013). Asyn-
chronous intrusion recovery for interconnected web
services. In Proceedings of the Twenty-Fourth ACM
Symposium on Operating Systems Principles, SOSP
’13, pages 213–227, New York, NY, USA. Associa-
tion for Computing Machinery.
Hammad, R. and Wu, C. (2014). Provenance as a service:
A data-centric approach for real-time monitoring. In
2014 IEEE International Congress on Big Data, pages
258–265.
Haraty, R. A., Kaddoura, S., and Zekri, A. S. (2018).
Recovery of business intelligence systems: Towards
guaranteed continuity of patient centric healthcare
systems through a matrix-based recovery approach.
Telematics Informatics, 35(4):801–814.
Haraty, R. A. and Zbib, M. (2014). A matrix-based damage
assessment and recovery algorithm. In 2014 14th In-
ternational Conference on Innovations for Community
Services (I4CS), pages 22–27.
Haraty, R. A., Zbib, M., and Masud, M. (2016). Data dam-
age assessment and recovery algorithm from mali-
cious attacks in healthcare data sharing systems. Peer-
to-Peer Networking and Applications, 9(5):812–823.
He, L., Yue, P., Di, L., Zhang, M., and Hu, L.
(2015). Adding geospatial data provenance into
sdi—a service-oriented approach. IEEE Journal of Se-
lected Topics in Applied Earth Observations and Re-
mote Sensing, 8(2):926–936.
Kaddoura, S., Haraty, R. A., Zekri, A., and Masud, M.
(2016). Tracking and repairing damaged healthcare
databases using the matrix. International Journal of
Distributed Sensor Networks, 2015:6:6.
Kim, T., Chandra, R., and Zeldovich, N. (2012). Recovering
from intrusions in distributed systems with DARE. In
Proceedings of the Third ACM SIGOPS Asia-Pacific
conference on Systems, APSys ’12, page 10, USA.
USENIX Association.
Kim, T., Wang, X., Zeldovich, N., and Kaashoek,
M. F. (2010). Intrusion recovery using selective re-
execution. In Arpaci-Dusseau, R. H. and Chen, B., ed-
itors, 9th USENIX Symposium on Operating Systems
Design and Implementation, OSDI 2010, October 4-
6, 2010, Vancouver, BC, Canada, Proceedings, pages
89–104. USENIX Association.
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K.,
and Njilla, L. (2017). Provchain: A blockchain-
based data provenance architecture in cloud environ-
ment with enhanced privacy and availability. In 2017
17th IEEE/ACM International Symposium on Cluster,
Cloud and Grid Computing (CCGRID), pages 468–
477.
Liu, P. and Jajodia, S. (2001). Multi-phase damage confine-
ment in database systems for intrusion tolerance. In
Proceedings. 14th IEEE Computer Security Founda-
tions Workshop, 2001., pages 191–205.
Lomet, D., Vagena, Z., and Barga, R. (2006). Recov-
ery from ”bad” user transactions. In Proceedings of
Database Recovery from Malicious Transactions: A Use of Provenance Information
47