Maintaining security and timeliness in real-time database system

نویسندگان

  • Quazi N. Ahmed
  • Susan V. Vrbsky
چکیده

Real-time database systems can have security constraints in addition to timing constraints. Such real-time systems are typically contained in environments that exhibit hierarchical propagation of information, where mandatory access control for security is required. Conventional multi-level secure database models that implement mandatory access control are inadequate for time-critical applications and conventional real-time database models do not address security constraints. The objective of this work is to incorporate security constraints in real-time database systems in such a way that not only is security achieved, but achieving security does not degrade real-time performance significantly in terms of deadlines missed. We present two concurrency control algorithms for secure real-time databases: the Secure 2PLHP algorithm is based on a two-phase locking protocol and the Secure OPT algorithm uses the properties of an optimistic concurrency protocol. We implement the two algorithms and study their performance using a real-time database system simulation model. Our study covers both soft and firm real-time databases. Results show that both the algorithms perform fairly well in terms of security and timeliness compared to non-secure algorithms. We show that achieving increased security does not necessarily mean an increased sacrifice in real-time performance. Submitted to the Journal of Systems and Software

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive Policy for Improved Timeliness in Secure Database Systems

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that because of ...

متن کامل

Supporting security requirements in multilevel real-time databases

Database systems for real-time applicataons must satisfy timing constraints associated with transactions, in addition t o maintaining data consistency. In addition to real-time requirrments, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transactton pr-ncessang in real-tzme database systems. In this paper , we argue that due t o ...

متن کامل

Maintaining Security in Firm Real-Time Database Systems

Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints. Conventional multi-level secure database models are inadequate for time-critica...

متن کامل

Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'

Database systems for real-time applications must satisfy timing constraints associated with transactions , in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that due to the...

متن کامل

Supporting Security Requirements in Multilevelreal - Time

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper , we argue that due to the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Systems and Software

دوره 61  شماره 

صفحات  -

تاریخ انتشار 2002