• Title/Summary/Keyword: DB data recovery

Search Result 20, Processing Time 0.028 seconds

A Study on the Improvement Method of Deleted Record Recovery in MySQL InnoDB (MySQL InnoDB의 삭제된 레코드 복구 기법 개선방안에 관한 연구)

  • Jung, Sung Kyun;Jang, Jee Won;Jeoung, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.12
    • /
    • pp.487-496
    • /
    • 2017
  • In MySQL InnoDB, there are two ways of storing data. One is to create a separate tablespace for each table and store it separately. Another is to store all table and index information in a single system tablespace. You can use this information to recover deleted data from the record. However, in most of the current database forensic studies, the former is actively researched and its structure is analyzed, whereas the latter is not enough to be used for forensics. Both approaches must be analyzed in terms of database forensics because their storage structures are different from each other. In this paper, we propose a method for recovering deleted records in a method of storing records in IBDATA file, which is a single system tablespace. First, we analyze the IBDATA file to reveal its structure. And introduce delete record recovery algorithm which extended to an unallocated page area which was not considered in the past. In addition, we show that the recovery rate is improved up to 68% compared with the existing method through verification using real data by implementing the algorithm as a tool.

A study for improving database recovery ratio of Disaster Recovery System in financial industry (금융권 재해복구 시스템의 DB 데이터 복구율 향상을 위한 연구)

  • Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.655-667
    • /
    • 2014
  • A disaster is the time-excess case that computerized service can tolerate a failure and financial industry is being set up the disaster recovery system based on the disaster recovery plan and the business continuity plan for preparing these disasters. However, existing system can not guarantee the business continuity when it comes to cyber terror. This paper analyzes the building type and building technology of disaster recovery system for the financial fields. Also this paper explain the type of data backup using online redo log and type of archive log backup using WORM storage. And this paper proposes the model of improved data recovery combining above two types. Lastly this paper confirm the effectiveness and reliability for proposal rocovery model through the implementation of the test environment.

The Recovery Method for MySQL InnoDB Using Feature of IBD Structure (IBD 구조적특징을이용한 MySQL InnoDB의레코드복구기법)

  • Jang, Jeewon;Jeoung, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.59-66
    • /
    • 2017
  • MySQL database is the second place in the market share of the current database. Especially InnoDB storage engine has been used in the default storage engine from the version of MySQL5.5. And many companies are using the MySQL database with InnoDB storage engine. Study on the structural features and the log of the InnoDB storage engine in the field of digital forensics has been steadily underway, but for how to restore on a record-by-record basis for the deleted data, has not been studied. In the process of digital forensic investigation, database administrators damaged evidence for the purpose of destruction of evidence. For this reason, it is important in the process of forensic investigation to recover deleted record in database. In this paper, We proposed the method of recovering deleted data on a record-by-record in database by analyzing the structure of MySQL InnoDB storage engine. And we prove this method by tools. This method can be prevented by database anti forensic, and used to recover deleted data when incident which is related with MySQL InnoDB database is occurred.

An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment

  • Kim, Myoungjin;Cui, Yun;Lee, Hanku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3182-3202
    • /
    • 2015
  • Flexibly expanding the storage capacity required to process a large amount of rapidly increasing unstructured log data is difficult in a conventional computing environment. In addition, implementing a log processing system providing features that categorize and analyze unstructured log data is extremely difficult. To overcome such limitations, we propose and design a MongoDB-based unstructured log processing system (MdbULPS) for collecting, categorizing, and analyzing log data generated from banks. The proposed system includes a Hadoop-based analysis module for reliable parallel-distributed processing of massive log data. Furthermore, because the Hadoop distributed file system (HDFS) stores data by generating replicas of collected log data in block units, the proposed system offers automatic system recovery against system failures and data loss. Finally, by establishing a distributed database using the NoSQL-based MongoDB, the proposed system provides methods of effectively processing unstructured log data. To evaluate the proposed system, we conducted three different performance tests on a local test bed including twelve nodes: comparing our system with a MySQL-based approach, comparing it with an Hbase-based approach, and changing the chunk size option. From the experiments, we found that our system showed better performance in processing unstructured log data.

Design of Recovery Protocol for Synchronization of Spatio-Temporal Data on a Mobile Environments (모바일 환경에서 시공간데이터의 동기화를 위한 회복프로토콜 설계)

  • Kim, Hong-Ki;Kim, Dong-yun;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.253-256
    • /
    • 2009
  • Synchronization system which applies to two-way synchronization of spatio-temporal in the mobile environment maintains a consistence of DB from some defect during synchronization. This study analyzes defects that are generated at the mobile client-server environment and proposes recovery protocol which can rerun consistence of DB and synchronization.

  • PDF

A Study on the Establishment of the Standards for the Recycling Rate of Parts and Materials to Calculate Recyclability Rate of Electrical and Electronic Equipments (전기전자제품의 재활용가능률 산정을 위한 부품/소재의 재활용기준 정립에 관한 연구)

  • Yi, Hwa-Cho;Kang, Hong-Yun;Kim, Jin-Han;Shim, Kang-Sik;Kim, Jin-Ho;Han, Seong-Chul
    • Clean Technology
    • /
    • v.14 no.4
    • /
    • pp.232-241
    • /
    • 2008
  • European directive DIRECTIVE 2002/96/EC requires minimum recycling & recovery rates on waste electrical and electronic equipment (WEEE). We tried to make references for recycling and recovery rates of parts and materials used in electrical and electronic equipment (EEE), which could be used to calculate recyclability and recoverability rates of a product in the development phase. First, we investigated recycling processes of WEEE and recycling and recovery characteristics of parts and materials. Based on the investigation results and the european recycling data, we made a data base of parts and materials for calculation of recycling and recovery rates of EEE. The developed DB was improved by reflecting advices of european experts.

  • PDF

Consistency and Prformance Evaluation of Duplication Function for Backup Systems (백업시스템을 위한 복제기능의 정합성과 성능평가)

  • Seong, HaeKyung;Lee, Moongoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.147-153
    • /
    • 2012
  • As IT circumstance is complicated and the scale of infra increase, a recognition of security information system and data availability are raised. At this point, a value of information assets regards important, a study of high performance backup system for disaster recovery countermeasure is a field to impact on business directly. Therefore, this study executes duplication of high performance backup system and data consistency verification. And, a performance of comparison to DB table recovery process, a transaction process speed of duplication according to network bandwidth, and performance evaluation were executed.

An Efficient Recovery Method for Mobile Main Memory Database System (모바일 메인메모리 데이터베이스 시스템을 위한 효율적인 복구 기법)

  • Cho, Sung-Je
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.181-195
    • /
    • 2008
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. Thus, During transmission in wireless networks a base station failure inevitably causes data loss of the base station buffer. It is required to compensate the loss for communication. The existing methods for a base station failure are not adequate because they all suffer from too much overhead and resolve only the link failure. In this paper, we study an efficient recovry systems for a mobile DBMS. We propose SLL (Segment Log List) that enables the mobile host to compensate data loss efficiently in the case of base station failure. In SLL, a base station deliveries an output information of data cells to a mobile host. when a base station fails, the mobile host can retransmit just next data cells. We also prove the efficiency of new method.

Audit for Electronic Switching System Data Recovery (교환기 데이터 복구를 위한 감사기능)

  • 백정아;정태진이성근
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.269-272
    • /
    • 1998
  • The disks containing all the system software-OS(Operating System), application program, and DB(Data Base)-happen to be broken. This happens not only to general computer systems but also to electronic switching system. In the electronic switching system, this causes the essential data and software needed for operating the system to be damaged and is fatal to services, so that they should be recovered as soon as possible. Especially the data, having the information of subscriber, trunk, prefix, and system configuration should be receovered preferentially. To manage this situation, the system should let the operator know that the data are damaged and recover the damaged data. This paper shows a way of recovering this damaged data, the object data of audit, the structure of DBMS and the implementation of audit in the case of the domestic high capacity electronic switching system, TDX-10A.

  • PDF

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.