Abstract
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each data object. First, we discuss the conflicting nature of the requirements and then present our protocol. We state and prove the properties characterizing our protocol. The implementation details of the data object representation and the additional processing overhead are also discussed. Finally, opportunities for tuning the protocol to suit different application domains are presented.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Abbott, R. K. and Garcia-Molina, H. (1992) Scheduling Real-Time Transactions: A Performance Evaluation. ACM Transactions on Database Systems, 17, 513–60.
Ammann, P. and Jajodia, S. (1992) A Timestamp Ordering Algorithm for Secure, Single-version, Multi-level Databases. in Database Security, V: Status and Prospects, (ed. C.E. Landwehr and S. Jajodia), Elsevier Science Publishers B.V., 191–202.
Bell, D.E. and LaPadula, L.J. (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation. The Mitre Corp. Bernstein, P.A., Hadzilacos, V., and Goodman, N. (1987) Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, MA.
David, R. and Son, S.H. (1993) A Secure Two Phase Locking Protocol. Proc. the 12th Symposium on Reliable Distributed Systems, Princeton, NJ.
David, R., Son, S.H., and Mukkamala, R. (1995) Supporting Security Requirements in Multilevel Real-time Databases. Proc. 1995 IEEE Symp. Security and Privacy, 199–210, Oakland, California.
Goguen, J.A. and Meseguer, J. (1982) Security Policy and Security Models. Proc. the IEEE Symposium on Security and Privacy, 11–20.
Jajodia, S. and Atluri, V. (1992) Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. Proc. the IEEE Symposium on Security and Privacy, Oakland, CA, May 1992.
Kao, B. and Garcia-Molina, H. (1994) An Overview of Real-Time Database Systems, in Real-Time Computing, (eds: W.A. Halang and A.D. Stoyenko) NATO ASI Series F, 127, Springer-Verlag, 261–82.
Keefe, T.F., Tsai, W.T., and Srivastava, J. (1990) Multilevel Secure Database Concurrency Control. Proc. the Sixth International Conference on Data Engineering, 337–44, Los Angeles, CA. Lampson, B.W. (1973) A Note on the Confinement Problem. Communications of the ACM, 16, 613–5.
Lee, J. and Son, S.H. (1995) Concurrency Control Algorithms for Real-Time Database Systems, in Performance of Concurrency Control Mechanisms in Centralized Database Systems (ed. Vijay Kumar), Prentice Hall, 429–60.
Rajkumar, R., Sha, L., Lehoczky, J.P., and Ramamritham, K. (1995) An Optimal Priority Inheritance Policy for Synchronization, in Advances in Real-Time Systems, (ed. S.H. Son), Prentice-Hall, 249–71.
Sha, L., Rajkumar, R., and Lehoczky, J.P. (1990) Priority Inheritance Protocol: An Approach to Real-time Synchronization. IEEE Trans. Computers, 1175–85.
Son, S.H., Lee, J., and Lin, Y. (1992) Hybrid Protocols Using Dynamic Adjustment of Serialization Order for Real-Time Concurrency Control. Real-Time Systems Journal, 4, 269–76.
Son, S.H. and Thuraisingham, B. (1993) Towards a Multilevel Secure Database Management System for Real-Time Applications. Proc. IEEE Workshop on Real-Time Applications, New York, NY.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Mukkamala, R., Son, S.H. (1996). A secure concurrency control protocol for real-time databases. In: Spooner, D.L., Demurjian, S.A., Dobson, J.E. (eds) Database Security IX. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34932-9_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-34932-9_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2954-1
Online ISBN: 978-0-387-34932-9
eBook Packages: Springer Book Archive