To read this content please select one of the options below:

Distributed database damage assessment paradigm

Yanjun Zuo (Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, USA)
Brajendra Panda (Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 March 2006

907

Abstract

Purpose

Damage assessment and recovery play key roles in the process of secure and reliable computer systems development. Post‐attack assessment in a distributed database system is rather complicated due to the indirect dependencies among sub‐transactions executed at different sites. Hence, the damage assessment procedure in these systems must be carried out in a collaborative way among all the participating sites in order to accurately detect all affected data items. This paper seeks to propose two approaches for achieving this, namely, centralized and peer‐to‐peer damage assessment models.

Design/methodology/approach

Each of the two proposed methods should be applied immediately after an intrusion on a distributed database system was reported. In the category of the centralized model, three sub‐models are further discussed, each of which is best suitable for a certain type of situations in a distributed database system.

Findings

Advantages and disadvantages of the models are analyzed on a comparative basis and the most suitable situations to which each model should apply are presented. A set of algorithms is developed to formally describe the damage assessment procedure for each model (sub‐model). Synchronization is essential in any system where multiple processes run concurrently. User‐level synchronization mechanisms have been presented to ensure that the damage assessment operations are conducted in a correct order.

Originality/value

The paper proposes two means for damage assessment.

Keywords

Citation

Zuo, Y. and Panda, B. (2006), "Distributed database damage assessment paradigm", Information Management & Computer Security, Vol. 14 No. 2, pp. 116-139. https://doi.org/10.1108/09685220610655870

Publisher

:

Emerald Group Publishing Limited

Copyright © 2006, Emerald Group Publishing Limited

Related articles