Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases

Investigates issues related to transaction concurrency control in multilevel secure databases. This paper demonstrates how the conflicts between the correctness requirements and the secrecy requirements can be reconciled by proposing two different solutions. It first explores the correctness criteria that are weaker than one-copy serializability. Each of these weaker criteria, though not as strict as one-copy serializability, is required to preserve database consistency in some meaningful way, and moreover, its implementation does not require the scheduler to be trusted. It proposes three different, increasingly stricter notions of serializability (level-wise serializability, one-item read serializability and pair-wise serializability) that can serve as substitutes for one-copy serializability. The paper then investigates secure concurrency control protocols that generate one-copy serializable histories and presents a multiversion timestamping protocol that has several very desirable properties: it is secure, produces multiversion histories that are equivalent to serial one-copy histories in which transactions are placed in a timestamp order, eliminates starvation and can be implemented using single-level untrusted schedulers.

[1]  Ira B. Greenberg,et al.  Single-level multiversion schedulers for multilevel secure database systems , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.

[2]  Hector Garcia-Molina,et al.  Achieving high availability in distributed databases , 1987, 1987 IEEE Third International Conference on Data Engineering.

[3]  Sushil Jajodia,et al.  Transaction processing in multilevel-secure databases using replicated architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Weimin Du,et al.  InterBase: an execution environment for heterogeneous software systems , 1993, Computer.

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  Sushil Jajodia,et al.  Integrity Versus Security in Multi-Level Secure Databases , 1988, DBSec.

[7]  Irving L. Traiger,et al.  Granularity of Locks and Degrees of Consistency in a Shared Data Base , 1998, IFIP Working Conference on Modelling in Data Base Management Systems.

[8]  David P. Reed,et al.  Synchronization with eventcounts and sequencers , 1979, CACM.

[9]  Lui Sha Modular concurrency control and failure recovery--consistency, correctness and optimality (transaction, database, distributed, operating systems) , 1985 .

[10]  Leslie Lamport,et al.  Concurrent reading and writing , 1977, Commun. ACM.

[11]  A. Elmagarmid Database transaction models for advanced applications , 1992 .

[12]  Weimin Du,et al.  A paradigm for concurrency control in heterogeneous distributed database systems , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[13]  Rajeev Rastogi,et al.  Non-serializable executions in heterogeneous distributed database systems , 1991, [1991] Proceedings of the First International Conference on Parallel and Distributed Information Systems.

[14]  Wei-Tek Tsai,et al.  Multiversion concurrency control for multilevel secure database systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.