Maintaining security and timeliness in real-time database system

被引:17
|
作者
Ahmed, QN
Vrbsky, SV
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Lucent Technol, Middletown, NJ 07748 USA
关键词
concurrency control; covert channel; multilevel security; real-time databases;
D O I
10.1016/S0164-1212(01)00111-X
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Real-time database systems can have security constraints in addition to timing constraints. Such real-time systems are typically contained in environments that exhibit hierarchical propagation of information. where mandatory access control for security is required. Conventional multilevel secure (MLS) database models that implement mandatory access control are inadequate for time-critical applications and conventional real-time database models do not address security constraints, The objective of this work is to incorporate security constraints in real-time database systems in such a way that not only is security achieved, but achieving security does not degrade real-time performance significantly in terms of deadlines missed. We present two concurrency control algorithms for secure real-time databases: the Secure two-phase locking high priority (2PLHP) algorithm is based on a two-phase locking protocol and the Secure optimistic concurrency control (OPT) algorithm uses the properties of an optimistic concurrency protocol. We implement the two algorithms and study their performance using a real-time database system simulation model. Our study covers both soft and firm real-time databases. Results show that both the algorithms perform fairly well in terms of security and timeliness compared to non-secure algorithms. We show that achieving increased security does not necessarily mean an increased sacrifice in real-time performance. (C) 2002 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:15 / 29
页数:15
相关论文
共 50 条
  • [1] Supporting timeliness and security in real-time database systems
    Son, SH
    NINTH EUROMICRO WORKSHOP ON REAL TIME SYSTEMS, PROCEEDINGS, 1997, : 266 - 273
  • [2] Partial security and timeliness in real-time database systems
    Son, SH
    PARALLEL AND DISTRIBUTED PROCESSING, 1998, 1388 : 1117 - 1120
  • [3] Maintaining security in firm real-time database systems
    Ahmed, QN
    Vrbsky, SV
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 83 - 90
  • [4] Issues and approaches to supporting timeliness and security in real-time database systems
    Son, SH
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (04) : 397 - 410
  • [5] Maintaining integrity constraints and security in real-time database systems
    Ahmed, QN
    Vrbsky, SV
    INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS, 1998, : 255 - 269
  • [6] Systematic security and timeliness tradeoffs in real-time embedded systems
    Kang, Kyoung-Don
    Son, Sang H.
    12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 183 - +
  • [7] Secure real-time transaction processing with timeliness guarantees in mobile distributed real-time database systems
    Xiao, YY
    Liu, YS
    Liao, GQ
    Liu, XF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 358 - 370
  • [8] Partial security policies to support timeliness in secure real-time databases
    Son, SH
    Chaney, C
    Thomlinson, NP
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 136 - 147
  • [9] Implementation of a real-time database system
    Aranha, RFM
    Ganti, V
    Narayanan, S
    Muthukrishnan, CR
    Prasad, STS
    Ramamritham, K
    INFORMATION SYSTEMS, 1996, 21 (01) : 55 - 74
  • [10] Real-time security monitoring based on the ORACLE database security model
    Zhang Fang'e
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 235 - 238