Starvation-free secure multiversion concurrency control

https://doi.org/10.1016/S0020-0190(98)00014-3Get rights and content

Abstract

Concurrency control is important for multilevel secure databases because a covert channel can be easily created through collaboration of multilevel transactions in most traditional concurrency control mechanisms. We, in this paper, propose a secure multiversion concurrency control mechanism. We present concepts of an invisible area and a t-lock to prevent retrieval anomaly and starvation of high transactions that may often occur in the previous works on secure concurrency control. Our proposed method prevents the creation of covert channel without retrieval anomaly and starvation of high transactions while providing serializable schedules for multilevel transactions.

References (8)

  • V. Atluri et al.

    Alternative correctness criteria for concurrent execution of transactions in MLS databases

    IEEE Trans. Knowledge and Data Engineering

    (1996)
  • D.E. Bell et al.

    Secure computer systems: Unified exposition and multics interpretation

  • P.A. Bernstein et al.

    Concurrency Control, and Recovery in Database Systems

    (1997)
  • S. Castano et al.

    Database Security

    (1994)
There are more references available in the full text version of this article.

Cited by (9)

  • A new secure 2PL real-time concurrency control algorithm (ES2PL)

    2022, International Journal of Intelligent Networks
    Citation Excerpt :

    The two-phase locking approach is based on a locking mechanism that assures the Serializability of concurrent transactions in order to keep the database system consistent and secure. Each database data item is coupled with a shared variable called a lock, which records the state of the data object and allows mutually exclusive transactions to manage shared access to the data object [1,9,19,21,23]. There are two phases of operations in two-phase locking.

  • Development of a concurrency control technique for multilevel secure databases

    2014, ICROIT 2014 - Proceedings of the 2014 International Conference on Reliability, Optimization and Information Technology
  • Detection and resolution of deadlocks in multi-level secure databases

    2013, International Journal of Engineering and Technology
  • Concurrency control for multilevel secure databases

    2009, International Journal of Network Security
  • Secure transaction management protocols for MLS/DDBMS

    2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
View all citing articles on Scopus
View full text