Data hibernation framework in workflows under intrusion threat

Sohail Safdar*, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The main objective of the research is to define and propose a framework for data hibernation in the workflows under intrusion threat. When the intrusion is detected, the data services need to be discontinued immediately to retain the security and the integrity of the valuable data, till the system is recovered from the threat. By discontinuing data services, the end users may face inconveniences in using the system because of its temporary unavailability. Data hibernation addresses a mechanism of secure transferring of data and providing an access of the data alternatively keeping the data integrity intact. Data hibernation involves three steps i.e. designing an alternate schema for storing data, transferring data to that alternate storage and providing an access to that data. Hence the system can continue to provide data services securely to the end user even in the threat situations.

Original languageEnglish
Title of host publicationProceedings of the 2011 IEEE Symposium on Computers and Informatics
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages680-685
Number of pages6
ISBN (Electronic)9781612846910
ISBN (Print)9781612846897
DOIs
Publication statusPublished - 21 Jul 2011
Event2011 IEEE Symposium on Computers and Informatics, ISCI 2011 - Kuala Lumpur, Malaysia
Duration: 20 Mar 201122 Mar 2011

Conference

Conference2011 IEEE Symposium on Computers and Informatics, ISCI 2011
Country/TerritoryMalaysia
CityKuala Lumpur
Period20/03/1122/03/11

Keywords

  • data hibernation
  • dimensions
  • IDS (Intrusion Detection System)
  • system availability

Fingerprint

Dive into the research topics of 'Data hibernation framework in workflows under intrusion threat'. Together they form a unique fingerprint.

Cite this