Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

Total Page:16

File Type:pdf, Size:1020Kb

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014 437 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Luca Ferretti, Michele Colajanni, and Mirco Marchetti Abstract—Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies. Index Terms—Cloud, security, confidentiality, SecureDBaaS, database Ç 1INTRODUCTION N a cloud context, where critical information is placed in SecureDBaaS that supports the execution of concurrent Iinfrastructures of untrusted third parties, ensuring data and independent operations to the remote encrypted confidentiality is of paramount importance [1], [2]. This database from many geographically distributed clients as requirement imposes clear data management choices: in any unencrypted DBaaS setup. To achieve these goals, original plain data must be accessible only by trusted SecureDBaaS integrates existing cryptographic schemes, parties that do not include cloud providers, intermediaries, isolation mechanisms, and novel strategies for management and Internet; in any untrusted context, data must be of encrypted metadata on the untrusted cloud database. This encrypted. Satisfying these goals has different levels of paper contains a theoretical discussion about solutions for complexity depending on the type of cloud service. There data consistency issues due to concurrent and independent are several solutions ensuring confidentiality for the storage client accesses to encrypted data. In this context, we cannot as a service paradigm (e.g., [3], [4], [5]), while guaranteeing apply fully homomorphic encryption schemes [7] because of confidentiality in the database as a service (DBaaS) paradigm their excessive computational complexity. [6] is still an open research area. In this context, we propose The SecureDBaaS architecture is tailored to cloud SecureDBaaS as the first solution that allows cloud tenants platforms and does not introduce any intermediary proxy to take full advantage of DBaaS qualities, such as or broker server between the client and the cloud availability, reliability, and elastic scalability, without provider. Eliminating any trusted intermediate server exposing unencrypted data to the cloud provider. allows SecureDBaaS to achieve the same availability, The architecture design was motivated by a threefold reliability, and elasticity levels of a cloud DBaaS. Other goal: to allow multiple, independent, and geographically proposals (e.g., [8], [9], [10], [11]) based on intermediate distributed clients to execute concurrent operations on server(s) were considered impracticable for a cloud-based encrypted data, including SQL statements that modify the solution because any proxy represents a single point of database structure; to preserve data confidentiality and failure and a system bottleneck that limits the main consistency at the client and cloud level; to eliminate any benefits (e.g., scalability, availability, and elasticity) of a intermediate server between the cloud client and the cloud database service deployed on a cloud platform. Unlike provider. The possibility of combining availability, elasti- SecureDBaaS, architectures relying on a trusted intermedi- city, and scalability of a typical cloud DBaaS with data ate proxy do not support the most typical cloud scenario confidentiality is demonstrated through a prototype of where geographically dispersed clients can concurrently issue read/write operations and data structure modifica- tions to a cloud database. The authors are with the University of Modena and Reggio Emilia, via A large set of experiments based on real cloud platforms Vignolese 905/b, Modena 41125, Italy. E-mail: {luca.ferretti, michele. colajanni, mirco.marchetti}@unimore.it. demonstrate that SecureDBaaS is immediately applicable to any DBMS because it requires no modification to the cloud Manuscript received 16 Sept. 2012; revised 14 Apr. 2013; accepted 23 May 2013; published online 30 May 2013. database services. Other studies where the proposed Recommended for acceptance by X. Li, P. McDaniel, R. Poovendran, and architecture is subject to the TPC-C standard benchmark G. Wang. for different numbers of clients and network latencies For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TPDS-2012-09-0921. show that the performance of concurrent read and write Digital Object Identifier no. 10.1109/TPDS.2013.154. operations not modifying the SecureDBaaS database 1045-9219/14/$31.00 ß 2014 IEEE Published by the IEEE Computer Society 438 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014 structure is comparable to that of unencrypted cloud In such a way, they prevent one cloud provider to read its database. Workloads including modifications to the data- portion of data, but information can be reconstructed by base structure are also supported by SecureDBaaS, but at colluding cloud providers. A step forward is proposed in the price of overheads that seem acceptable to achieve the [15], that makes it possible to execute range queries on data desired level of data confidentiality. The motivation of and to be robust against collusive providers. SecureDBaaS these results is that network latencies, which are typical differs from these solutions as it does not require the use of of cloud scenarios, tend to mask the performance costs of multiple cloud providers, and makes use of SQL-aware data encryption on response time. The overall conclusions encryption algorithms to support the execution of most of this paper are important because for the first time they common SQL operations on encrypted data. demonstrate the applicability of encryption to cloud SecureDBaaS relates more closely to works using en- database services in terms of feasibility and performance. cryption to protect data managed by untrusted databases. The remaining part of this paper is structured as follows: In such a case, a main issue to address is that cryptographic Section 2 compares our proposal to existing solutions techniques cannot be naı¨vely applied to standard DBaaS related to confidentiality in cloud database services. because DBMS can only execute SQL operations over Sections 3 and 4 describe the overall architecture and how plaintext data. it supports its main operations, respectively. Section 5 Some DBMS engines offer the possibility of encrypting reports some experimental evaluation achieved through the data at the filesystem level through the so-called Transpar- implemented prototype. Section 6 outlines the main results. ent Data Encryption feature [16], [17]. This feature makes it Space limitation requires us to postpone the assumed possible to build a trusted DBMS over untrusted storage. security model in Appendix A, which can be found on However, the DBMS is trusted and decrypts data before the Computer Society Digital Library at http://doi. their use. Hence, this approach is not applicable to the ieeecomputersociety.org/10.1109/TPDS.2013.154, to de- DBaaS context considered by SecureDBaas, because we scribe our solutions to concurrency and data consistency assume that the cloud provider is untrusted. problems in Appendix B, available in the online supple- Other solutions, such as [18], allow the execution of mental material, to detail the prototype architecture in operations over encrypted data. These approaches preserve Appendix C, available in the online supplemental material. data confidentiality in scenarios where the DBMS is not trusted; however, they require a modified DBMS engine and are not compatible with DBMS software (both 2RELATED WORK commercial and open source) used by cloud providers. SecureDBaaS provides several original features that differ- On the other hand, SecureDBaaS is compatible with entiate it from previous work in the field of security for standard DBMS engines, and allows tenants to build secure remote database services. cloud databases by leveraging cloud DBaaS services already available. For this reason, SecureDBaaS is more related to . It guarantees data confidentiality by allowing a [9] and [8] that preserve data confidentiality in untrusted cloud database server to execute concurrent SQL DBMSs through encryption techniques, allow the execution operations (not only read/write, but also modifica- of SQL operations over encrypted data, and are compatible tions to the database structure) over encrypted data. with common DBMS
Recommended publications
  • Database Security in the Cloud
    Database security in the cloud I M A L S A K H I Examensarbete inom Datateknik Grundnivå, 15 hp 1 Stockholm 2012 Detta examensarbete har utförts i samarbete med Försvarsmakten Handledare på Försvarsmakten: Ingvar Ståhl Databassäkerhet i molnet Database security in the cloud I m a l S a k h i Examensarbete inom Datorteknik Grundnivå, 15 hp Handledare på KTH: Magnus Brenning Examinator: Thomas Lindh Skolan för teknik och hälsa TRITA-STH 2012:51 Kungliga Tekniska Högskolan Skolan för teknik och hälsa 136 40 Handen, Sweden http://www.kth.se/sth ii Abstract The aim of the thesis is to get an overview of the database services available in cloud computing environment, investigate the security risks associated with it and propose the possible countermeasures to minimize the risks. The thesis also analyzes two cloud database service providers namely; Amazon RDS and Xeround. The reason behind choosing these two providers is because they are currently amongst the leading cloud database providers and both provide relational cloud databases which makes the comparison useful. The focus of the analysis has been to provide an overview of their database services as well as the available security measurements. A guide has been appended at the end of the report to help with technical configurations of database migration and connecting applications to the databases for the two mentioned cloud database providers. The thesis has been conducted on behalf of the Swedish Armed Forces and after reviewing the security risks associated with cloud databases, it is recommended that the Armed Forces should refrain from public cloud database services.
    [Show full text]
  • 6-Th INTERNATIONAL SCIENTIFIC CONFERENCE
    International Conference on Applied Information and Communication Technologies (AICT2013), 25.-26. April, 2013, Jelgava, Latvia Different solutions of MySQL in the cloud – security and possibilities Zigmunds Bulins, Vjaceslavs Sitikovs Institute of Applied Software, Riga Technical University, Meza 1/3, Riga, LV-1048, Latvia [email protected], [email protected] Abstract: Cloud computing is a good way to raise productivity of offered service without investments into new infrastructure, training of the personnel or software acquisition. This technology expands potential possibilities of existing information systems. In recent years cloud computing grew from good business concept to one of the most demanded industry in information technologies. The paper contains a short review of different cloud database providers which uses MySQL as a basis. Technical nuances, potential problems and risks related to migration of the existing MySQL databases to the new environment are reviewed. In the paper we try to review the actual possibilities of the new platform and compare the cloud DBaaS (database as a service) solutions which are implemented with MySQL database management system widely used in the web. Keywords: MySQL, DBaaS, Heroku, Google Cloud SQL, ClearDB. Introduction Cloud computing is a dynamic method of increasing productivity of service or possibilities without investments in new infrastructure, training of the personnel or software licensing. This expands possibilities of existing information systems. In recent years cloud computing grew from good concept business to one of the most quickly developing industries of information technologies (Chandra, Mondal, 2011). In the last two years there was quite a lot of activity around the cloud databases on the stage – Google, Amazon and Xeround (Xeround, 2012a) companies announced their DBaaS based on the MySQL database.
    [Show full text]
  • OVERVIEW of DATABASES AS SERVICE PROVIDING SYSTEMS on the BASE of XEROUND, AMAZON RDS and SQL AZURE Yeleu Y.A
    Section VII: Informatics and Control in Engineering Systems CLOUD TECHNOLOGY: OVERVIEW OF DATABASES AS SERVICE PROVIDING SYSTEMS ON THE BASE OF XEROUND, AMAZON RDS AND SQL AZURE Yeleu Y.A. Scientific supervisor: Botygin I.A., associate professor Language supervisor: Pichugova I.L., senior teacher Tomsk Polytechnic University, 30, Lenin Avenue, Tomsk, 634050, Russia E-mail: [email protected] Cloud computing is the delivery provisioning often appear to be unlimited and can of computing as a service rather than a product, be appropriated in any quantity at any time. whereby shared resources, software, and 3. On-demand self-service. A consumer can information are provided to computers and other unilaterally get computing capabilities, such as devices as a metered service over server time and network storage, as needed a network (typically the Internet). [1] Cloud automatically without requiring human interaction computing is a model for delivering information with each service provider. technology services where resources are retrieved 4. Broad network access. Capabilities are available from the Internet through web-based tools and over the network and accessed through standard applications, rather than a direct connection to a mechanisms that promote use by heterogeneous server. Data and software packages are stored in thin or thick client platforms (e.g., mobile phones, servers. However, cloud computing structure tablets, laptops, and workstations). allows access to information as long as an 5. Economy of the process.Measured service is electronic device has access to the web. This type used in cloud technology. Cloud systems of system allows employees to work remotely. [2] automatically control and optimize resource use by There is a more common definition.
    [Show full text]
  • © 2011 by the 451 Group. All Rights Reserved Nosql, Newsql and Beyond Open Source Driving Innovation in Distributed Data Management
    © 2011 by The 451 Group. All rights reserved NoSQL, NewSQL and Beyond Open Source Driving Innovation in Distributed Data Management Matt hew As lett, The 451 Group [email protected] © 2011 by The 451 Group. All rights reserved Overview – Open source impact in the database market – NoSQL and NewSQL databases • Adoption/development drivers • Use cases – And beyond • Data grid/cache • Cloud databases • Total data © 2011 by The 451 Group. All rights reserved 451 Research is focused on the business of enterprise IT innovation. The company’s analysts provide critical and timely insight into the competitive dynamics of innovation in emerging technology segments. The 451 Group Tier1 Research is a single‐source research and advisory firm covering the multi‐tenant datacenter, hosting, IT and cloud‐computing sectors, blending the best of industry and financial research. The Uptime Institute is ‘The Global Data Center Authority’ and a pioneer in the creation and facilitation of end‐user knowledge communities to improve reliability and uninterruptible availability in datacenter facilities. TheInfoPro is a leading IT advisory and research firm that provides real‐world ppperspectives on the customer and market dynamics of the TOTAL DATA enterprise information technology landscape, harnessing the collective knowledge and insight of leading IT organizations worldwide. ChangeWave Research is a research firm that identifies and quantifies ‘change’ in consumer spending behavior, corporate purchasing, and industry, company and technology trends. © 2011 by The 451 Group. All rights reserved Coverage areas – Senior analyst, enterprise software – Commercial Adoption of Open Source (CAOS) • Adoption by enterprises • Adoption by vendors – Information Management • Databases • Data warehousing • Data caching © 2011 by The 451 Group.
    [Show full text]
  • Fluidcloud: an Open Framework for Relocation of Cloud Services
    FluidCloud: An Open Framework for Relocation of Cloud Services Andy Edmonds Thijs Metsch Zurcher¨ Hochschule fur¨ Angewandte Wissenschaften Intel Ireland Limited Dana Petcu Erik Elmroth Jamie Marshall Institute e-Austria Timisoara Umea˚ University Prologue Plamen Ganchosov CloudSigma Abstract and automated. From this work a number of research and engineering challenges arise including data optimisation, Cloud computing delivers new levels of being connected, runtime architecture adaptation, and goal-oriented ser- instead of the once disconnected PC-type systems. The vice instance relocation. proposal in this paper extends that level of connectedness in the cloud such that cloud service instances, hosted by providers, can relocate between clouds. This is key in 2 A Problem in the Cloud? order to provide economical and regulatory benefits but more importantly liberation and positive market disrup- Cloud service instances remain locked under the control tion. of the service provider. FluidCloud will liberate these in- While service providers want to lock in their cus- stances. Having the ability for a cloud service instance to tomer’s services, FluidCloud wants the liberation of easily and seamlessly move from one provider to another those and thereby allow the service owner to freely will bring advantages and freedom to any cloud service choose the best matching provider at any time. In the owner. Essentially, it will bring service instance “move- cloud world of competing cloud standards and software ment rights” to the cloud. However there is no encom- solutions, each only partially complete, the central re- passing means to accomplish this. search question which this paper intends to answer: How FluidCloud fits within the soon future cloud.
    [Show full text]
  • Effect of Information Flow Analysis in Different Cloud Computing Environments
    IPASJ International Journal of Computer Science (IIJCS) Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm A Publisher for Research Motivation ........ Email: [email protected] Volume 4, Issue 9, September 2016 ISSN 2321-5992 Effect of Information Flow Analysis in different Cloud Computing Environments Mr. Ravindra Sharma Chandigarh College of Architecture, Chandigarh ABSTRACT Cloud computing provides variety of benefits to deliver services over the net. The services area unit categorised into 3 distinct environments Software-as-a-Service, Platform-as-aService, and Infrastructure-as-a-Service. Now-a-days, a replacement rising service known as Database-as-aService that could be a a part of Software-as-a-Service. This service is outstanding for database- driven applications. This paper lists necessary parameters of information. As a result, the performance analysis of information as MySQL varies considerably counting on the various cloud infrastructure like Amazon EC2 and Joyent Cloud. 1. INTRODUCTION Cloud computing is technology that uses net and management remote server to keep up information and application. rather than putting in set of computer code for every pc, you wish to load your application and use it while not installation when and access personal files at any pc with the assistance of net. Cloud computing is assessed into 3 services: Infrastructure-as- a-Service, Platform-as-a Service and Software-as-a-Service even Database-as-a-Service (DBaaS) is enclosed into Softwareas-a-Service. This technology provides America economical computing by centralized storage, memory, process and information measure. 2. AMAZON ELASTIC CLOUD FIGURE EC2 Amazon Cloud EC2 provides cloud computing answer on the idea of as per usage.
    [Show full text]
  • A Survey on Recent Developments in Cloud Based Systems
    [TYPE TEXT] Recent Developments in Cloud Based Systems: State of Art Mansaf Alam a and Kashish Ara Shakil b a, b Department of Computer Science , Jamia Millia Islamia, New Delhi 110025 b Corresponding Author Abstract— Cloud computing is the latest buzzword in the head of techies round the clock these days. The importance and the different applications of cloud computing are overwhelming and thus, it is a topic of huge significance. It provides several astounding features like Multitenancy, on demand service, pay per use etc. This manuscript presents an exhaustive survey on cloud computing technology and attempts to cover most of the developments that have taken place in the field of cloud computing. It discusses about the various available cloud computing platforms, Security in cloud, reference architectures for cloud and storage of data in cloud computing. Furthermore it gives an insight into the recent developments in cloud environment with the help of use cases and the author’s perspective about the future of the respective use cases. Finally it concludes by discussing the limitations of data management in cloud and potential research issues in cloud computing that needs to be addressed in future along with a proposed architecture for cloud. Index Terms—Cloud computing, CDBMS, database as a service, cloud platforms —————————— —————————— 1 INTRODUCTION Cloud computing is a newly emerging technology for the future with it roots based on the rapidly increasing demands on data centers that needs to be catered to. Cloud computing is defined as the use of computing resources to access data over the internet. It is a means or a mechanism to enhance the existing capabilities of Information technology by many folds [120].The terminology cloud comes from the fact that the data is not stored on your desktop or your device but is located far away similar to a cloud in literal terms, but despite of it being away its within your reach, you can access it irrespective of your geographical location using a computing device via an internet.
    [Show full text]
  • Mysql in the Hosted Cloud Scale13x
    MySQL in the Hosted Cloud Colin Charles, MariaDB Corporation Ab [email protected] | [email protected] http://mariadb.com/ | http://mariadb.org/ http://bytebot.net/blog/ | @bytebot on Twitter SCALE13x, Los Angeles, CA, USA 21 February 2015 1 whoami • Work on MariaDB at MariaDB Corporation (SkySQL Ab) • Merged with Monty Program Ab, makers of MariaDB • Formerly MySQL AB (exit: Sun Microsystems) • Past lives include Fedora Project (FESCO), OpenOffice.org 2 Agenda • MySQL as a service offering (DBaaS) • Choices • Considerations • MySQL versions & access • Costs • Deeper into RDS • Should you run this on EC2 or an equivalent? • Conclusion 3 MySQL as a service • Database as a Service (DBaaS) • MySQL available on-demand, without any installation/configuration of hardware/ software • Pay-per-usage based • Provider maintains MySQL, you don’t maintain, upgrade, or administer the database 4 New way of deployment • Enter a credit card number • call API (or use the GUI) ec2-run-instances ami- xxx -k ${EC2_KEYPAIR} -t m1.large nova boot --image centos6-x86_64 --flavor m1.large db1 credit: http://www.flickr.com/photos/68751915@N05/6280507539/ 5 Why DBaaS? • “Couldn’t we just have a few more servers to handle the traffic spike during the elections?” • Don’t have a lot of DBAs, optimise for operational ease • Rapid deployment & scale-out 6 Your choices today • Amazon Web Services Relational Database Service (RDS) • Rackspace Cloud Databases • Google Cloud SQL • HP Helion Public Cloud Relational DB 7 There are more • Jelastic - PaaS offering MySQL, MariaDB •
    [Show full text]
  • Effective Mysql Replication Techniques in Depth
    Oracle_Flash / Effective MySQL: Replication Techniques in Depth / Bradford / 186-8 ® Effective MySQL Replication Techniques in Depth 00-FM.indd 1 9/6/12 6:20 PM Oracle_Flash / Effective MySQL: Replication Techniques in Depth / Bradford / 186-8 About the Authors Ronald Bradford has worked in the relational database industry for over 20 years. His professional background began in 1989 with Ingres and Oracle RDBMS. His expertise includes a vast experience with database architec- ture, performance tuning, and management of large enterprise systems. Ronald has, for the past 13 years, worked primarily with MySQL, the world’s most popular open source database. His previous employment has includ- ed Oracle Corporation (1996–1999) as an Oracle Consultant and MySQL, Inc. (2006–2008) as a senior MySQL Consultant. His contributions to the MySQL community have included recognition as the all-time top individual MySQL blog contributor at Planet MySQL (2010), an Oracle ACE Director (2010), and MySQL Community Member of the Year (2009). Ronald combines his extensive consulting expertise with a passion to share the knowledge and benefits of using MySQL. He is the author of four books on MySQL, and his many public speaking engagements have in- cluded presentations at conferences in over 25 countries. The Effective MySQL series of books and presentations aim to provide practical educa- tion for DBAs, developers, and architects in MySQL performance, scalabil- ity, and business continuity. Chris Schneider is a long-time open source advocate and MySQL evange- list, administrator, and architect. Over the past decade Chris has devoted his professional career to open source technologies, with his primary focus being MySQL at scale.
    [Show full text]
  • Cloud Data Warehousing for Smes
    Cloud Data Warehousing for SMEs Sérgio Fernandes1 and Jorge Bernardino1,2 1ISEC – Superior Institute of Engineering of Coimbra, Polytechnic Institute of Coimbra, 3030-190 Coimbra, Portugal 2CISUC – Centre of Informatics and Systems of the University of Coimbra, University of Coimbra, 3030-290 Coimbra, Portugal Keywords: Database as a Service, Cloud Computing, Cloud Databases, Database Management System, DBaaS, DWaaS. Abstract: The emergence of cloud computing caused a revolution in the universe of Information Technology. With cloud computing solutions it is possible to access powerful features, hardware and software in less time and with considerably lower costs by using the model "pay-as-you-go". At the same time, this turnover increased information, and data warehouses must respond to this new reality. Small and medium enterprises (SMEs) were deprived of owning a traditional data warehouse due to the costs involved, but the cloud has made it possible to overcome this barrier. This paper provides an overview of Data Warehouse (DW) in the cloud and presents the main characteristics of the following solutions: Amazon Redshift, IBM dashDB, Snowflake, Teradata Active Data Warehouse Private Cloud, Treasure Data, and Microsoft Azure. 1 INTRODUCTION Cloud computing is presented as a medium that allows easy acquisition of computational resources, In recent years, the significant growth in data scalable infrastructure with minimal setup and it is a volume and its complexity makes organizations look service at a lower cost, using the model "pay-as-you- for ways to keep the focus on their business instead go" (Malliga, 2012). Many organizations have of in their IT infrastructure. Advances in chosen to implement or migrate their systems, infrastructure and technology have led companies to processes and data in order to reap the benefits of trust the cloud model, including Data Warehouses elasticity that this environment provides, so that IT (DW).
    [Show full text]
  • A Practical Guide to Big Data: Opportunities, Challenges & Tools 2 © 2012 Dassault Systèmes About EXALEAD
    A PRACTICAL GUIDE TO BIG DaTA Opportunities, Challenges & Tools 3DS.COM/EXALEAD “Give me a lever long enough and a fulcrum on which to place it, and I shall move the world.” 1 Archimedes ABOUT THE AUTHOR Laura Wilber is the former founder and CEO of California-based AVENCOM, Inc., a software development company specializing in online databases and database-driven Internet applications (acquired by Red Door Interactive in 2004), and she served as VP of Marketing for Kintera, Inc., a provider of SaaS software to the nonprofit and government sectors. She also developed courtroom tutorials for technology-related intellectual property litigation for Legal Arts Multimedia, LLC. Ms. Wilber earned an M.A. from the University of Maryland, where she was also a candidate in the PhD program, before joining the federal systems engineering division of Bell Atlantic (now Verizon) in Washington, DC. Ms. Wilber currently works as solutions ana- lyst at EXALEAD. Prior to joining EXALEAD, Ms. Wilber taught Business Process Reengineering, Management of Informa- tion Systems and E-Commerce at ISG (l’Institut Supérieur de Gestion) in Paris. She and her EXALEAD colleague Gregory Grefenstette recently co-authored Search-Based Applications: At the Confluence of Search and Database Technologies, published in 2011 by Morgan & Claypool Publishers. A Practical Guide to Big Data: Opportunities, Challenges & Tools 2 © 2012 Dassault Systèmes ABOUT EXALEAD Founded in 2000 by search engine pioneers, EXALEAD® is the leading Search-Based Application platform provider to business and government. EXALEAD’s worldwide client base includes leading companies such as PricewaterhouseCooper, ViaMichelin, GEFCO, the World Bank and Sanofi Aventis R&D, and more than 100 million unique users a month use EXALEAD’s technology for search and information access.
    [Show full text]
  • Effective Mysql Backup and Recovery About the Author Ronald Bradford Has Worked in the Relational Database Field for Over 20 Years
    Effective MySQL Backup and Recovery About the Author Ronald Bradford has worked in the relational database field for over 20 years. With his professional background and a decade of working knowledge in database architecture, performance tuning, and management of large enterprise systems using Ingres and Oracle, Ronald has for the past 13 years worked primarily with MySQL, the world’s most popular open source database. He has worked both at Oracle Corporation (1996–1999) as an Oracle Consultant and MySQL, Inc. (2006–2008) as a senior MySQL Consultant. His contributions to the MySQL community include being recognized as the all-time top individual MySQL blog contributor at Planet MySQL (2010), and international recognitions include being named an Oracle ACE Director (2010) and MySQL Community Member of the Year (2009). Ronald combines his extensive consulting expertise with a passion to share the knowledge and benefits of using MySQL. Starting in 2006, his many public speaking engagements have included over 60 presentations in 20 countries in 2010–2011. About the Technical Editors Hans Forbrich has been working with computers since the early 1970s, in particular with entity-relationship and relational databases starting in 1979 using an engine on IBM mainframes called GERM (General Entity Relationship Model). Since that time, Hans has been a DBA, an operations architect for a number of organizations, and an Oracle University instructor but always heavily involved in high availability and recoverability. As a fellow ACE Director, Hans is pleased and honored to have been a technical reviewer for this book. Backup and recovery is an important and often overlooked area of MySQL, and Ronald’s expertise and experience in this area shines through.
    [Show full text]