An Intrusion Tolerance Scheme for a Cloud of Databases Environment
Title | An Intrusion Tolerance Scheme for a Cloud of Databases Environment |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Chatti, S., Ounelli, H. |
Conference Name | 2016 19th International Conference on Network-Based Information Systems (NBiS) |
Date Published | Sept. 2016 |
Publisher | IEEE |
ISBN Number | 978-1-5090-0979-4 |
Keywords | CDC, cloud computing, Cloud of databases environment, composability, concurrent access, Data models, database management systems, Databases, databases environment cloud, decision making, dependency, Estimation, graph theory, intrusion tolerance, intrusion tolerance scheme, malicious activity, malicious transactions, processing node, pubcrawl, Resiliency, running system serialization, Safety, security, security of data, serializability, subtransactions, transaction dependency graph, transaction processing, transaction serializability, Wireless communication, XML |
Abstract | The serializability of transactions is the most important property that ensure correct processing to transactions. In case of concurrent access to the same data by several transactions, or in case of dependency relationships between running sub transactions. But some transactions has been marked as malicious and they compromise the serialization of running system. For that purpose, we propose an intrusion tolerant scheme to ensure the continuity of the running transactions. A transaction dependency graph is also used by the CDC to make decisions concerning the set of data and transactions that are threatened by a malicious activity. We will give explanations about how to use the proposed scheme to illustrate its behavior and efficiency against a compromised transaction-based in a cloud of databases environment. Several issues should be considered when dealing with the processing of a set of interleaved transactions in a transaction based environment. In most cases, these issues are due to the concurrent access to the same data by several transactions or the dependency relationship between running transactions. The serializability may be affected if a transaction that belongs to the processing node is compromised. |
URL | https://ieeexplore.ieee.org/document/7789805 |
DOI | 10.1109/NBiS.2016.4 |
Citation Key | chatti_intrusion_2016 |
- malicious activity
- XML
- Wireless communication
- transaction serializability
- transaction processing
- transaction dependency graph
- subtransactions
- serializability
- security of data
- security
- Safety
- running system serialization
- Resiliency
- pubcrawl
- processing node
- malicious transactions
- CDC
- intrusion tolerance scheme
- intrusion tolerance
- graph theory
- estimation
- dependency
- Decision Making
- databases environment cloud
- Databases
- database management systems
- Data models
- concurrent access
- composability
- Cloud of databases environment
- Cloud Computing