Skip to main content

Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version

  • Conference paper
  • First Online:
Languages, Compilers, and Tools for Embedded Systems (LCTES 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1985))

Included in the following conference series:

Abstract

In many real time applications, security is an important requirement, since the system maintains sensitive information to be shared by multiple users with different security levels. A secure real-time database system must satisfy not only logical data consistency but also the timing constraints and security requirements associated with transactions. Even though an optimistic concurrency control method outperforms locking based methods in firm real-time database systems, in which late transactions are immediately discarded, existing secure real-time concurrency control methods are mostly based on locking. In this paper, we propose a new optimistic concurrency control protocol for secure real-time database systems. We also compare the performance characteristics of our protocol with locking based methods while varying workloads. The results show that optimistic concurrency control performs well over a wide range of system loading and resource availability conditions.,

This work was supported by International collaborative Research Program (TRP-9802-6) sponsored by Ministry of Information and Communication of Korea

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. R. K. Abbott and H. Garcia-Molina, “Scheduling Real-Time Transactions: A Performance Evaluation”, In ACM Transactions on Database Systems, 17, pp513–560, 1992.

    Article  Google Scholar 

  2. D. E. Bell and L. J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretation”, The Mitre Corp., 1976.

    Google Scholar 

  3. Rasikan David, Sang H. Son and Ravi Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases”, In IEEE Symposium on Security and Privacy, Oakland, CA, pp 199–210, 1995.

    Google Scholar 

  4. B. George and J. Haritsa, “Secure Transaction Processing in Firm Real-Time Database System”, In Proceedings of ACM SIGMOD, pp462–473, 1997.

    Google Scholar 

  5. J. R. Haritsa, M. J. Carey, and M. Livny, “Dynamic Real-Time Optimistic Concurrency Control”, In 11 th IEEE Real-Time Systems Symposium, 1990.

    Google Scholar 

  6. J. R. Haritsa, M. J. Carey, and M. Livny, “On Being Optimistic about Real-Time”, In Proceedings of the 1990 ACM PODS Symposium, pp331–343, April 1990.

    Google Scholar 

  7. Soek-Hee Hong, Myung-Ho Kim, Yoon-Joon Lee, “Methods of Concurrency Control in Real-Time Database”, In Korean Information Science Society Review, Vol. 11, No. 1, pp 26–36, 1993.

    Google Scholar 

  8. Thomas F. Keefe, W. T. Tsai, Jaideep Srivastava, “Database Concurrency Control in Multilevel Secure Database Management Systems”, In IEEE Transaction on knowledge and Data Engineering, vol 5, no. 6, pp1039–1055, 1993.

    Article  Google Scholar 

  9. Young-kuk Kim and Sang H. Son, “Predictability and Consistency in Real-Time Database Systems”, Advances in Real-Time Systems, S. H. Son (ed.), Prentice Hall, pp 509–531, 1995.

    Google Scholar 

  10. J. Lee and S. H. Son, “Using Dynamic Adjustment of Serialization Order for Real-Time Database Systems”, In 14 th IEEE Real-Time Systems Symposium, pp66–75, 1993.

    Google Scholar 

  11. J. Mcdermott and S. Jajodia, “Orange Locking Channel-Free Database Concurrency Control via Locking”, In IFIP WG 11.3 Workshop in Database Security, pp267–284, 1992.

    Google Scholar 

  12. Ira S. Moskowitz and Myong H. Kang, “Covert Channels-Here to Stay?”, In Proceedings of COMPASS 94, pp235–243, 1994.

    Google Scholar 

  13. R. Mukkamala and S. H. Son, “A Secure Concurrency Control Protocol for Real-Time Databases”, In Annual IFIP WG 11.3 Conference of Database Security, Rensselaerville, New York, Aug. pp 235–253, 1995.

    Google Scholar 

  14. Chanjung Park, Seog Park, and Sang H. Son, “Priority-driven Secure Multi-version Locking Protocol for Real-Time Secure Database Systems”, In Proceedings of IFIP 11 th Working Conference on Database Security, August 1997.

    Google Scholar 

  15. Chanjung Park and Seog Park, “Alternative Correctness Criteria for Multi-version Concurrency Control and a Locking Protocol via Freezing”, In International Database Engineering and Applications Symposium (IDEA’ 97), pp. 73–81, August 1997.

    Google Scholar 

  16. S. H. Son and R. David, “Design and Analysis of a Secure Two-Phase Locking Protocol,” In 18 th International Computer Software and Applications Conference (COMPSAC’94), Taipei, Taiwan, pp 374–379, 1994.

    Google Scholar 

  17. S. H. Son, R. David, and B. Thuraisingham, “An Adaptive Policy for Improved Timeliness in Secure Database Systems”, In Annual IFIP WG 11.3 Conference of Database Security, pp223–233, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, BS., Kim, D., Lee, S. (2001). Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version. In: Davidson, J., Min, S.L. (eds) Languages, Compilers, and Tools for Embedded Systems. LCTES 2000. Lecture Notes in Computer Science, vol 1985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45245-1_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-45245-1_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41781-1

  • Online ISBN: 978-3-540-45245-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics