Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966944
|View full text |Cite
|
Sign up to set email alerts
|

Efficient audit-based compliance for relational data retention

Abstract: The Sarbanes-Oxley Act inspired research on long-term high-integrity retention of business records, based on the long-term immutability guarantees that WORM storage servers offer for files. Researchers recently proposed a Log-compliant DBMS Architecture (LDA) that extends those immutability guarantees to relational tuples, using an approach that imposes a 10-20% performance penalty on TPC-C benchmark runs.In this paper, we present the transaction log on WORM (TLOW) approach for supporting long-term immutabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…The problem of predicting and encoding all permissible requests has been recognised in an a posteriori compliance control model [Etalle and Winsborough 2007] and an audit-based access control model [Cederquist et al 2007;Hasan and Winslett 2011]. These models allow access to take place but retrospectively check to determine whether it conforms to policy.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of predicting and encoding all permissible requests has been recognised in an a posteriori compliance control model [Etalle and Winsborough 2007] and an audit-based access control model [Cederquist et al 2007;Hasan and Winslett 2011]. These models allow access to take place but retrospectively check to determine whether it conforms to policy.…”
Section: Related Workmentioning
confidence: 99%
“…A more efficient architecture is the transaction log on WORM (TLOW) approach for supporting long-term immutability of relational tuples [Hasan and Winslett 2011]. TLOW stores the current database instance in ordinary storage and the transaction log on WORM storage, while dispensing with the compliance log altogether.…”
Section: Related Workmentioning
confidence: 99%
“…These techniques are also insufficient for a DUM because they often protect privacy by limiting data access too much, hence affecting its utility [22]. Finally, auditing systems [6,14,13,10] are designed to detect data misuses after the fact, which is in contrast to the DUM which works both in an online and offline settings. Triggers [19] are inadequate since they only apply to DML statements (all our example policies are non-DML statements) and can not validate policies across multiple databases.…”
Section: Related Workmentioning
confidence: 99%