J4

• Original Articles • Previous Articles     Next Articles

Intrusion-tolerant based architecture for database system security

ZHU Jian-ming1,2;MA Jian-feng1

  

  1. (1. School of Computer Science and Technology, Xidian Univ., Xi'an 710071, China;
    2. State Key Lab. of Information Security, Chinese Academy of Science, Beijing 100039, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2003-02-20 Published:2003-02-20

Abstract: This paper proposes an architecture for database system security based on intrusion-tolerant mechanisms. The architecture is built on three layers security model, which is to defense intrusion in the outer lyaer, to detect intrusion in the middle layer, and to tolerate intrusion in the inner layer. We utilize the techniques of both redundancy and diversity and threshold secret share schemes to implement the survivability of databases and to protect confidential data from compromised servers in the presence of intrusions. Compared with the existing schemes, our approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.

Key words: database, intrusion-tolerant, intrusion-detection

CLC Number: 

  • TP309.2