首页 | 官方网站   微博 | 高级检索  
     

数据库恶意事务恢复日志系统
引用本文:陈敏,陈榕,王云帆.数据库恶意事务恢复日志系统[J].计算机工程,2011,37(12):33-35.
作者姓名:陈敏  陈榕  王云帆
作者单位:1. 中国长江三峡集团公司信息中心,湖北宜昌,443002
2. 中国长江电力股份有限公司,湖北宜昌,443002
摘    要:恶意事务攻击成功后的数据恢复机制要求日志文件必须同时记录写操作信息和读操作信息。为此,提出一种数据库恶意事务恢复日志策略,并基于该策略设计日志系统。在日志系统中,结构化查询语言(SQL)语句过滤可保护日志文件的安全,拒绝终端客户对日志文件的非法操作;敏感信息设置从行级和列级2个方面设置日志记录必须满足的约束条件,可有效控制日志文件的规模;写日志产生器通过使用触发器的临时表完成对写操作的记录;读日志产生器通过重构SQL语句产生临时表,再访问临时表完成对读操作的记录。实验结果表明,该系统可有效记录数据库读写操作,但同时会降低整体系统的效率。

关 键 词:恶意事务恢复  日志系统  敏感信息  写日志产生器  读日志产生器
收稿时间:2010-12-24

Log System for Recovery from Database Malicious Transaction
CHEN Min,CHEN Rong,WANG Yun-fan.Log System for Recovery from Database Malicious Transaction[J].Computer Engineering,2011,37(12):33-35.
Authors:CHEN Min  CHEN Rong  WANG Yun-fan
Affiliation:1.Information Center,China Three Gorges Project Corporation,Yichang 443002,China; 2.China Yangtze Power Co.,Ltd.,Yichang 443002,China)
Abstract:Recovery from malicious transaction has become an important method to protect database, the new recovery mechanism raises new requirement that the log file should not only record information of write operation but also the information of read operation. To fulfill the new requirement, a new log strategy is proposed, According to this strategy, the log system is designed and implemented, the system is composed by four parts: SQL statements filtrating, sensitive information setting, write log generator and read log generator. Structured Query Language(SQL) statements filtrating aims to protect the log file from malicious users. Sensitive information setting gives constraints to log record to control the size of log file. Write log generator uses triggers to records the information of write operation. Read log generator records the information of read operation via re-constructing SQL statements, creating temporary table and accessing temporary table. Experimental result shows that log system records database operations effectively, but decreases the efficiency of the whole system.
Keywords:recovery from malicious transaction  log system  sensitive information  write log generator  read log generator
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号