Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version

  • Byeong-Soo Jeong
  • Daeho Kim
  • Sungyoung Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1985)

Abstract

In many real time applications, security is an important requirement, since the system maintains sensitive information to be shared by multiple users with different security levels. A secure real-time database system must satisfy not only logical data consistency but also the timing constraints and security requirements associated with transactions. Even though an optimistic concurrency control method outperforms locking based methods in firm real-time database systems, in which late transactions are immediately discarded, existing secure real-time concurrency control methods are mostly based on locking. In this paper, we propose a new optimistic concurrency control protocol for secure real-time database systems. We also compare the performance characteristics of our protocol with locking based methods while varying workloads. The results show that optimistic concurrency control performs well over a wide range of system loading and resource availability conditions.,

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. [1]
    R. K. Abbott and H. Garcia-Molina, “Scheduling Real-Time Transactions: A Performance Evaluation”, In ACM Transactions on Database Systems, 17, pp513–560, 1992.CrossRefGoogle Scholar
  2. [2]
    D. E. Bell and L. J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretation”, The Mitre Corp., 1976.Google Scholar
  3. [3]
    Rasikan David, Sang H. Son and Ravi Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases”, In IEEE Symposium on Security and Privacy, Oakland, CA, pp 199–210, 1995.Google Scholar
  4. [4]
    B. George and J. Haritsa, “Secure Transaction Processing in Firm Real-Time Database System”, In Proceedings of ACM SIGMOD, pp462–473, 1997.Google Scholar
  5. [5]
    J. R. Haritsa, M. J. Carey, and M. Livny, “Dynamic Real-Time Optimistic Concurrency Control”, In 11 th IEEE Real-Time Systems Symposium, 1990.Google Scholar
  6. [6]
    J. R. Haritsa, M. J. Carey, and M. Livny, “On Being Optimistic about Real-Time”, In Proceedings of the 1990 ACM PODS Symposium, pp331–343, April 1990.Google Scholar
  7. [7]
    Soek-Hee Hong, Myung-Ho Kim, Yoon-Joon Lee, “Methods of Concurrency Control in Real-Time Database”, In Korean Information Science Society Review, Vol. 11, No. 1, pp 26–36, 1993.Google Scholar
  8. [8]
    Thomas F. Keefe, W. T. Tsai, Jaideep Srivastava, “Database Concurrency Control in Multilevel Secure Database Management Systems”, In IEEE Transaction on knowledge and Data Engineering, vol 5, no. 6, pp1039–1055, 1993.CrossRefGoogle Scholar
  9. [9]
    Young-kuk Kim and Sang H. Son, “Predictability and Consistency in Real-Time Database Systems”, Advances in Real-Time Systems, S. H. Son (ed.), Prentice Hall, pp 509–531, 1995.Google Scholar
  10. [10]
    J. Lee and S. H. Son, “Using Dynamic Adjustment of Serialization Order for Real-Time Database Systems”, In 14 th IEEE Real-Time Systems Symposium, pp66–75, 1993.Google Scholar
  11. [11]
    J. Mcdermott and S. Jajodia, “Orange Locking Channel-Free Database Concurrency Control via Locking”, In IFIP WG 11.3 Workshop in Database Security, pp267–284, 1992.Google Scholar
  12. [12]
    Ira S. Moskowitz and Myong H. Kang, “Covert Channels-Here to Stay?”, In Proceedings of COMPASS 94, pp235–243, 1994.Google Scholar
  13. [13]
    R. Mukkamala and S. H. Son, “A Secure Concurrency Control Protocol for Real-Time Databases”, In Annual IFIP WG 11.3 Conference of Database Security, Rensselaerville, New York, Aug. pp 235–253, 1995.Google Scholar
  14. [14]
    Chanjung Park, Seog Park, and Sang H. Son, “Priority-driven Secure Multi-version Locking Protocol for Real-Time Secure Database Systems”, In Proceedings of IFIP 11 th Working Conference on Database Security, August 1997.Google Scholar
  15. [15]
    Chanjung Park and Seog Park, “Alternative Correctness Criteria for Multi-version Concurrency Control and a Locking Protocol via Freezing”, In International Database Engineering and Applications Symposium (IDEA’ 97), pp. 73–81, August 1997.Google Scholar
  16. [16]
    S. H. Son and R. David, “Design and Analysis of a Secure Two-Phase Locking Protocol,” In 18 th International Computer Software and Applications Conference (COMPSAC’94), Taipei, Taiwan, pp 374–379, 1994.Google Scholar
  17. [17]
    S. H. Son, R. David, and B. Thuraisingham, “An Adaptive Policy for Improved Timeliness in Secure Database Systems”, In Annual IFIP WG 11.3 Conference of Database Security, pp223–233, 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Byeong-Soo Jeong
    • 1
  • Daeho Kim
    • 1
  • Sungyoung Lee
    • 1
  1. 1.School of Electronics & InformationKyung Hee UniversityKorea

Personalised recommendations