Abstract
We propose a transaction length-sensitive protocol based on altruistic locking to satisfy the security requirements and improve the degree of concurrency for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed for extended altruistic locking. We adapted XAL to multilevel secure database and we investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
T. F. Keefe, W. T. Tsai and J. Srivastava, “Database Concurrency Control in Multilevel Secure Database Management Systems,” IEEE Transactions on Knowledge and Data Engineering, Vol.5, No.6, pp.1039–1055, December 1993.
T. F. Keefe, W. T. Tsai and J. Srivastava, “Multilevel Secure Database Concurrency Control,” Data Engineering, Proceedings. Sixth International Conference on, 1990.
D. E. Bell, and L. J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretations,” Technical Report MTR-2997, Mitre Corp., March 1976
P. A. Bernstein, V. Hadzilacos and N. Goodman,, “Concurrency Control and Recovery in Database Systems,” Addison-Wesley, Massachusetts, U.S.A., 1987.
K. Salem, H. Garcia-Molina and J. Shands, “Altruistic Locking,” ACM Transactions on Database Systems, Vol.19, No.1, pp.117–169, March 1994.
H. Bartley, C. Jensen and W. Oxley, “Scheme User’s Guide and Language Reference Manual,” Texas Instruments, Texas, U.S.A., 1988.
R. Agrawal, M. J. Carey and M. Linvy, “Concurrency Control Performance Modeling: Alternative and Implications,” ACM Transactions on Database Systems, Vol.12, No.4, pp. 609–654, December 1987.
Zeigler, B. P., “Object-Oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic Systems,” Academic press, San Diego, CA, 1990
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, HW., Rhee, HK., Chung, T.M., Eom, Y.I., Kim, UM. (2001). A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_13
Download citation
DOI: https://doi.org/10.1007/3-540-45600-7_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42880-0
Online ISBN: 978-3-540-45600-1
eBook Packages: Springer Book Archive