Concurrency control in multilevel-secure databases based on replicated architecture

In a multilevel secure database management system based on the replicated architecture, there is a separate database management system to manage data at or below each security level, and lower level data are replicated in all databases containing higher level data. In this paper, we address the open issue of concurrency control in such a system. We give a secure protocol that guarantees one-copy serializability of concurrent transaction executions and can be implemented in such a way that the size of the trusted code (including the code required for concurrency and recovery) is small.

[1]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[2]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[3]  Catherine A. Meadows,et al.  Achieving a Trusted Database Management System Using Parallelism , 1988, DBSec.

[4]  Hector Garcia-Molina,et al.  Update propagation in Bakunin data networks , 1987, PODC '87.

[5]  Dorothy E. Denning,et al.  The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[6]  Glenn H. MacEwen,et al.  Effects of Distributed System Technology on Database Security: A Survey , 1988, DBSec.

[7]  Irving L. Traiger,et al.  The Recovery Manager of the System R Database Manager , 1981, CSUR.

[8]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[9]  Catherine D. Jensen,et al.  SDDM-a prototype of a distributed architecture for database security , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.

[10]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[11]  David P. Reed,et al.  Synchronization with eventcounts and sequencers , 1979, CACM.

[12]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[13]  Thomas H. Hinke,et al.  A Layered TCB Implementation versus the Hinke-Schaefer Approach , 1989, Database Security.

[14]  Sushil Jajodia,et al.  Transaction processing in multilevel-secure databases using replicated architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Richard D. Graubart,et al.  A Comparison of Three Secure DBMS Architectures , 1989, DBSec.