Visible to the public An Intrusion Tolerance Scheme for a Cloud of Databases Environment

TitleAn Intrusion Tolerance Scheme for a Cloud of Databases Environment
Publication TypeConference Paper
Year of Publication2016
AuthorsChatti, S., Ounelli, H.
Conference Name2016 19th International Conference on Network-Based Information Systems (NBiS)
KeywordsCDC, cloud computing, Cloud of databases environment, composability, concurrent access, Data models, database management systems, Databases, databases environment cloud, decision making, dependency, Estimation, graph theory, intrusion tolerance, intrusion tolerance scheme, malicious activity, malicious transactions, processing node, pubcrawl, Resiliency, running system serialization, Safety, security, security of data, serializability, subtransactions, transaction dependency graph, transaction processing, transaction serializability, Wireless communication, XML
AbstractThe serializability of transactions is the most important property that ensure correct processing to transactions. In case of concurrent access to the same data by several transactions, or in case of dependency relationships between running sub transactions. But some transactions has been marked as malicious and they compromise the serialization of running system. For that purpose, we propose an intrusion tolerant scheme to ensure the continuity of the running transactions. A transaction dependency graph is also used by the CDC to make decisions concerning the set of data and transactions that are threatened by a malicious activity. We will give explanations about how to use the proposed scheme to illustrate its behavior and efficiency against a compromised transaction-based in a cloud of databases environment. Several issues should be considered when dealing with the processing of a set of interleaved transactions in a transaction based environment. In most cases, these issues are due to the concurrent access to the same data by several transactions or the dependency relationship between running transactions. The serializability may be affected if a transaction that belongs to the processing node is compromised.
DOI10.1109/NBiS.2016.4
Citation Keychatti_intrusion_2016