Multilevel secure transaction processing

被引:0
|
作者
Jajodia, S. [1 ]
Atluri, V. [1 ]
Keefe, T.F. [1 ]
McCollum, C.D. [1 ]
Mukkamala, R. [1 ]
机构
[1] Ctr. for Secure Informations Systems, Dept. Info. and Software Syst. Eng., George Mason University, Fairfax, VA 22030-4444, United States
关键词
Algorithms - Concurrency control - Database systems - Network protocols - Scheduling - Theorem proving;
D O I
10.3233/JCS-2001-9301
中图分类号
学科分类号
摘要
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols. These modifications are necessary because preserving the usual transaction properties when transactions are executing at different security levels often conflicts with the enforcement of the security policy. Considerable effort has been devoted to the development of efficient, secure algorithms for the major types of secure DBMS architectures: kernelized, replicated, and distributed. An additional problem that arises uniquely in multilevel secure DBMSs is that of secure, correct execution when data at multiple security levels must be written within one transaction. Significant progress has been made in a number of these areas, and a few of the techniques have been incorporated into commercial trusted DBMS products. However, there are many open problems remain to be explored. This paper reviews the achievements to date in transaction processing for multilevel secure DBMSs. The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and then describes the results of research in multilevel secure transaction processing. Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. Finally, important new areas are identified for secure transaction processing research.
引用
收藏
相关论文
共 50 条
  • [11] Multilevel Secure Data Stream Processing
    Adaikkalavan, Raman
    Ray, Indrakshi
    Xie, Xing
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 122 - 137
  • [12] Bitcoins and Secure Financial Transaction Processing, Recent Advances
    Quamara, Sidharth
    Singh, Awadhesh Kumar
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 216 - 219
  • [13] Secure High-Rate Transaction Processing in Bitcoin
    Sompolinsky, Yonatan
    Zohar, Aviv
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 507 - 527
  • [14] Distributed Multilevel Secure Data Stream Processing
    Xie, Xing
    Ray, Indrakshi
    Ranasinghe, Waruna
    Gilbert, Philips A.
    Shashidhara, Pramod
    Yadav, Anoop
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 368 - 373
  • [15] On the Efficient Processing of Multilevel Secure Continuous Queries
    Xie, Xing
    Ray, Indrakshi
    Adaikkalavan, Raman
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 417 - 422
  • [16] Query Processing in Multilevel Secure Distributed Databases
    Sapra, Pooja
    Kumar, Suresh
    Rathy, R. K.
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 490 - 494
  • [17] Semantic-based transaction processing model for multilevel transactions
    Ray, Indrakshi
    Ammann, Paul
    Jajodia, Sushil
    Journal of Computer Security, 1998, 6 (03): : 181 - 217
  • [18] HybridChain: Fast, Accurate, and Secure Transaction Processing With Distributed Learning
    Taherpour, Amirhossein
    Wang, Xiaodong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 35 (06) : 813 - 827
  • [19] Multilevel secure data stream processing: Architecture and implementation
    Adaikkalavan, Raman
    Xie, Xing
    Ray, Indrakshi
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (05) : 547 - 581