• Publication
  • PrePrints
  • Abstract - Risk Aware Query Replacement Approach For Secure Databases Performance Management.
 This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Risk Aware Query Replacement Approach For Secure Databases Performance Management.
PrePrint
ISSN: 1545-5971
Ousmane Dia, Ousane Amadou Dia is with Computer Science and Engineering Dept. University of South Carolina - Columbia.(email:dia@email.sc.edu)
Large amount of data and increased de- mand to extract, analyze and derive knowledge from data are impairing nowadays performance of enterprise mission- critical systems such as databases. For databases, the chal- lenging problem is to manage complex and sometimes non- optimized queries executed on enormous datasets stored across several tables. This generally results in increased query response time and loss of employees productivity. In this paper, we investigate the problem of enterprise computing resources availability. Our goal is to minimize performance degradation arising from resource intensive queries. We propose a risk aware approach that decou- ples the process of analyzing resource requirements of sql queries from their execution. We leverage XACML to con- trol users' requests and to monitor database loads. This allows us to adjust available resources in a database sys- tem to computing resource needs of queries. A query can therefore run in a database if it does not severely impact the performance of the database. Otherwise, we propose to the requester a replacement query denoted what-if-query. Such query proposes results that are similar to the results of the requester's query, is secure and provides acceptable answers when it executes without compromising the per- formance of the database.
Citation:
Csilla Farkas, Ousmane Dia, "Risk Aware Query Replacement Approach For Secure Databases Performance Management.," IEEE Transactions on Dependable and Secure Computing, 22 May 2014. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/TDSC.2014.2306675>
Usage of this product signifies your acceptance of the Terms of Use.