z-logo
open-access-imgOpen Access
DBKnot: A Transparent and Seamless, Pluggable, Tamper Evident Database
Author(s) -
Islam S. M. Khalil,
Sherif El-Kassas,
Karim Sobh
Publication year - 2021
Publication title -
epic series in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 2398-7340
DOI - 10.29007/7l81
Subject(s) - computer science , database transaction , tamper resistance , hash function , leverage (statistics) , computer security , overhead (engineering) , data integrity , database , append , retrofitting , computer network , operating system , machine learning , programming language , structural engineering , engineering
Database tampering is a key security threat that impacts the integrity of sensitive in- formation of crucial businesses. The evolving risks of security threats as well as regulatory compliance are important driving forces for achieving better integrity and detecting pos- sible data tampering by either internal or external malicious perpetrators. We present DBKnot, an architecture for a tamper detection solution that caters to such problem while maintaining seamlessness and ease of retrofitting into existing append-only database ap- plications with near-zero modifications. We also pay attention to data confidentiality by making sure that the data never leaves the organization’s premises. We leverage designs like chains of record hashes to achieve the target solution. A set of preliminary exper- iments have been conducted that resulted in DBKnot adding an overhead equal to the original transaction time. We have run the same experimemts experiments with different parallelization and pipelining versions of DBKnot which resulted in cutting approximately 66% of the added overhead.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here