Multilevel Secure Data Stream Processing

With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed to address the data processing needs of such applications that require collection of high-speed data, computing results on-the-fly, and taking actions in real-time. Although a lot of work appears in the area of DSMS, not much has been done in multilevel secure (MLS) DSMS making the technology unsuitable for highly sensitive applications such as battlefield monitoring. An MLS DSMS should ensure the absence of illegal information flow in a DSMS and more importantly provide the performance needed to handle continuous queries.We investigate the issues important in an MLS DSMS and propose an architecture that best meets the goals of MLS DSMS.We discuss how continuous queries can be executed in such a system and sharing across queries accomplished for maximum performance benefits.

[1]  W. Marsden I and J , 2012 .

[2]  Kian-Lee Tan,et al.  ACStream: Enforcing Access Control over Data Streams , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[3]  Rüdiger Westermann,et al.  Real-time exploration of regular volume data by adaptive reconstruction of isosurfaces , 1999, The Visual Computer.

[4]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[5]  Rajeev Motwani,et al.  Load shedding for aggregation queries over data streams , 2004, Proceedings. 20th International Conference on Data Engineering.

[6]  Rajeev Motwani,et al.  Operator scheduling in data stream systems , 2004, VLDB 2004.

[7]  Kian-Lee Tan,et al.  Enforcing access control over data streams , 2007, SACMAT '07.

[8]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[9]  Sharma Chakravarthy,et al.  Stream Data Processing: A Quality of Service Perspective - Modeling, Scheduling, Load Shedding, and Complex Event Processing , 2009, Advances in Database Systems.

[10]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[11]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[12]  Joseph M. Hellerstein,et al.  Eddies: continuously adaptive query processing , 2000, SIGMOD 2000.

[13]  Sharma Chakravarthy,et al.  Load Shedding in MavStream: Analysis, Implementation, and Evaluation , 2008, BNCOD.

[14]  Brian Cabral,et al.  Accelerated volume rendering and tomographic reconstruction using texture mapping hardware , 1994, VVS '94.

[15]  Rasikan David,et al.  Design and analysis of a secure two-phase locking protocol , 1994, Proceedings Eighteenth Annual International Computer Software and Applications Conference (COMPSAC 94).

[16]  Paul Ning,et al.  Vector quantization for volume rendering , 1992, VVS.

[17]  Jennifer Widom,et al.  Models and issues in data stream systems , 2002, PODS.

[18]  Ying Xing,et al.  Scalable Distributed Stream Processing , 2003, CIDR.

[19]  Gultekin Özsoyoglu,et al.  Temporal and Real-Time Databases: A Survey , 1995, IEEE Trans. Knowl. Data Eng..

[20]  Margaret H. Dunham,et al.  Common Subexpression Processing in Multiple-Query Processing , 1998, IEEE Trans. Knowl. Data Eng..

[21]  Jeffrey F. Naughton,et al.  Rate-based query optimization for streaming information sources , 2002, SIGMOD '02.

[22]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[23]  Jay Torborg,et al.  Talisman: commodity realtime 3D graphics for the PC , 1996, SIGGRAPH.

[24]  Sharma Chakravarthy,et al.  Anatomy of a Data Stream Management System , 2006, ADBIS Research Communications.

[25]  Donald P. Greenberg,et al.  Adaptive shadow maps , 2001, SIGGRAPH.

[26]  Sheldon J. Finkelstein Common expression analysis in database applications , 1982, SIGMOD '82.

[27]  Sushil Jajodia,et al.  Multilevel Secure Transaction Processing: Status and Prospects , 1996, DBSec.

[28]  James E. Fowler QccPack: an open-source software library for quantization, compression, and coding , 2000, Proceedings DCC 2000. Data Compression Conference.

[29]  Jayant R. Haritsa,et al.  Secure Concurrency Control in Firm Real-Time Database Systems , 2004, Distributed and Parallel Databases.

[30]  Michael Stonebraker,et al.  Load Shedding in a Data Stream Manager , 2003, VLDB.

[31]  Sharma Chakravarthy,et al.  Scheduling Strategies for Processing Continuous Queries over Streams , 2004, BNCOD.

[32]  Michael Stonebraker,et al.  Retrospective on Aurora , 2004, The VLDB Journal.

[33]  Elisa Bertino,et al.  A Security Punctuation Framework for Enforcing Access Control on Streaming Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[34]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[35]  Marc Levoy,et al.  Light field rendering , 1996, SIGGRAPH.

[36]  Jennifer Widom,et al.  The CQL continuous query language: semantic foundations and query execution , 2006, The VLDB Journal.

[37]  Jaime G. Carbonell,et al.  Predicate Indexing for Incremental Multi-Query Optimization , 2008, ISMIS.

[38]  Stanley B. Zdonik,et al.  Window-aware load shedding for aggregation queries over data streams , 2006, VLDB.

[39]  Michael Stonebraker,et al.  Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.

[40]  Jörg Meier,et al.  Securing the Borealis Data Stream Engine , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).

[41]  Sharma Chakravarthy,et al.  INTEGRATING STREAM AND COMPLEX EVENT PROCESSING , 2009 .

[42]  Elisa Bertino,et al.  StreamShield: a stream-centric approach towards security and privacy in data stream environments , 2009, SIGMOD Conference.

[43]  Raman Adaikkalavan,et al.  Secure shared continuous query processing , 2011, SAC '11.

[44]  Rajeev Motwani,et al.  Chain: operator scheduling for memory minimization in data stream systems , 2003, SIGMOD '03.

[45]  Yizhou Yu,et al.  Compressing Texture Maps for Large Real Environments , 2002 .

[46]  Abhinandan Das,et al.  Approximate join processing over data streams , 2003, SIGMOD '03.

[47]  Sharma Chakravarthy,et al.  Scheduling Strategies and Their Evaluation in a Data Stream Management System , 2006, BNCOD.

[48]  Paul Ning,et al.  Fast volume rendering of compressed data , 1993, Proceedings Visualization '93.

[49]  Michael Stonebraker,et al.  Operator Scheduling in a Data Stream Manager , 2003, VLDB.

[50]  Maneesh Agrawala,et al.  Rendering from compressed textures , 1996, SIGGRAPH.