Skip to main content

Protecting and Recovering Database Systems Continuously

  • Conference paper
Book cover Advances in Data and Web Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4505))

Abstract

Data protection is widely deployed in database systems, but the current technologies (e.g. backup, snapshot, mirroring and replication) can not restore database systems to any point in time. This means that data is less well protected than it ought to be. Continuous data protection (CDP) is a new way to protect and recover data, which changes the data protection focus from backup to recovery. We (1) present a taxonomy of the current CDP technologies and a strict definition of CDP, (2) describe a model of continuous data protection and recovery (CDP-R) that is implemented based on CDP technology, and (3) report a simple evaluation of CDP-R. We are confident that CDP-R continuously protect and recover database systems in the face of data loss, corruption and disaster, and that the key techniques of CDP-R are helpful to build a continuous data protections system, which can improve the reliability and availability of database systems and guarantee the business continuity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Keeton, K., Santos, C.A., Beyer, D., Chase, J.S., Wilkes, J.: Designing for Disasters. In: Proc. of the 3rd USENIX Conf on File and Storage Technologies (FAST’04), pp. 59–72 (2004)

    Google Scholar 

  2. Patterson, D., Brown, A., et al.: Recovery oriented computing (ROC): Motivation, Definition, techniques, and Case Studies. Computer Science Technical Report, U.C. Berkeley (2002)

    Google Scholar 

  3. Choy, M., Leong, H.V., Wong, M.H.: Disaster Recovery Techniques for Database systems. Communications of the ACM, 272–280 (2002)

    Google Scholar 

  4. Chervenak, A.L., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques. In: Proc. of Joint NASA and IEEE Mass Storage Conference (1998)

    Google Scholar 

  5. Patterson, D.A., Gibson, G., Katz, R.H.: A case for redundant arrays of inexpensive disks (RAID). In: Proc. of the ACM SIGMOD International Conference on Management of Data, pp. 109–116 (1988)

    Google Scholar 

  6. Ji, M., Veitch, A., Wilkes, J.: Seneca: Remote Mirroring Done Write. In: Proc. of the 2nd USENIX Conf on File and Storage Technologies, FAST’03 (2003)

    Google Scholar 

  7. Duzy, G.: Match snaps to apps. Storage. Special Issue on Managing the information that drives the enterprise, 46–52 (2005)

    Google Scholar 

  8. Zou, H.M., Jahanian, P.: A real-time primary-backup replication service. IEEE Trans. on Parallel and Distributed Systems, 533–548 (1999)

    Google Scholar 

  9. Olson, B.J., et al.: CDP Buyers Guide: An overview of today’s Continuous Data Protection (CDP) solutions. SNIA DMF CDP SIG (2005), http://www.snia.org/

  10. O’Neill, B.: Any-point-in-time backups. Storage. Special Issue on Managing the Information that Drives the Enterprise (2005)

    Google Scholar 

  11. Azagury, A., Factor, M.E., Satran, J.: Point-in-Time Copy: Yesterday, Today and Tomorrow. In: Proc. of the 10th Goddard Conference on Mass Storage Systems and Technologies, pp. 259–270 (2002)

    Google Scholar 

  12. Morrey III, C.B., Grunwald, D.: Peabody: The time traveling disk. In: Proceedings of IEEE Mass Storage Conference, San Diego, CA (2003)

    Google Scholar 

  13. Yang, Q., Xiao, W., Ren, J.: TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time. In: Proc. of the 33rd Annual International Symposium on Computer Architecture (ISCA’06), Boston, USA (2006)

    Google Scholar 

  14. Rowan, M.: Continuous Data Protection: A Technical Overview. Revivio, Inc. (2005), http://www.revivio.com/documents/CDP%20Technical%20Overview.pdf

  15. Protecting Transaction Data: What Every IT Pro Should Know. TimeSpring Software Corp. (2004), http://www.timespring.com/Protecting%20Transaction%20Data.pdf

  16. Connor, D.: Continuous data protection finds Supporters. In: Network World (2005), http://www.networkworld.com/news/2005/091605-continuous-data-protection.html

  17. National Institute of Standards and Technology, FIPS 180-1. Secure Hash Standard. US Department of Commerce (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Guozhu Dong Xuemin Lin Wei Wang Yun Yang Jeffrey Xu Yu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Li, Z., Xu, J. (2007). Protecting and Recovering Database Systems Continuously. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds) Advances in Data and Web Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72524-4_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72524-4_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72483-4

  • Online ISBN: 978-3-540-72524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics