Skip to main content

A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

Abstract

We propose a transaction length-sensitive protocol based on altruistic locking to satisfy the security requirements and improve the degree of concurrency for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed for extended altruistic locking. We adapted XAL to multilevel secure database and we investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. F. Keefe, W. T. Tsai and J. Srivastava, “Database Concurrency Control in Multilevel Secure Database Management Systems,” IEEE Transactions on Knowledge and Data Engineering, Vol.5, No.6, pp.1039–1055, December 1993.

    Article  Google Scholar 

  2. T. F. Keefe, W. T. Tsai and J. Srivastava, “Multilevel Secure Database Concurrency Control,” Data Engineering, Proceedings. Sixth International Conference on, 1990.

    Google Scholar 

  3. D. E. Bell, and L. J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretations,” Technical Report MTR-2997, Mitre Corp., March 1976

    Google Scholar 

  4. P. A. Bernstein, V. Hadzilacos and N. Goodman,, “Concurrency Control and Recovery in Database Systems,” Addison-Wesley, Massachusetts, U.S.A., 1987.

    Google Scholar 

  5. K. Salem, H. Garcia-Molina and J. Shands, “Altruistic Locking,” ACM Transactions on Database Systems, Vol.19, No.1, pp.117–169, March 1994.

    Article  Google Scholar 

  6. H. Bartley, C. Jensen and W. Oxley, “Scheme User’s Guide and Language Reference Manual,” Texas Instruments, Texas, U.S.A., 1988.

    Google Scholar 

  7. R. Agrawal, M. J. Carey and M. Linvy, “Concurrency Control Performance Modeling: Alternative and Implications,” ACM Transactions on Database Systems, Vol.12, No.4, pp. 609–654, December 1987.

    Article  Google Scholar 

  8. Zeigler, B. P., “Object-Oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic Systems,” Academic press, San Diego, CA, 1990

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HW., Rhee, HK., Chung, T.M., Eom, Y.I., Kim, UM. (2001). A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics