• DocumentCode
    390712
  • Title

    STAR: secure real-time transaction processing with timeliness guarantees

  • Author

    Kang, Kyoung-Don ; Son, Sang H. ; Stankovic, John A.

  • Author_Institution
    Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
  • fYear
    2002
  • fDate
    2002
  • Firstpage
    303
  • Lastpage
    314
  • Abstract
    Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., trade secret, manufacturing, or operational data, between transactions belonging to different security levels. Further transactions should be committed within their deadlines, i.e., before the market, manufacturing, or battlefield status changes. In this paper we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions to remain below a certain threshold. In our approach, mandatory access control mechanisms are applied for security purposes. QoS management, admission control, and feedback control schemes are applied to support certain guarantees on the miss ratio against potential overload and data conflicts. A detailed simulation study shows that our approach can support the specified miss ratio preventing illegal information flows even in the presence of unpredictable workloads and varying degrees of data contention, whereas baseline approaches fail.
  • Keywords
    authorisation; database management systems; quality of service; real-time systems; transaction processing; QoS management; STAR; admission control; clearance levels; data conflicts; data contention; data items; deadline miss ratio; feedback control; illegal inter-level information flow prevention; mandatory access control mechanisms; overload; real-time database architecture; real-time databases; secure real-time transaction processing; security-critical applications; sensitive data; sensitivity levels; simulation; timeliness guarantees; unpredictable workloads; Access control; Agile manufacturing; Application software; Computer science; Data security; Delay; Information security; Military computing; Real time systems; Transaction databases;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Real-Time Systems Symposium, 2002. RTSS 2002. 23rd IEEE
  • ISSN
    1052-8725
  • Print_ISBN
    0-7695-1851-6
  • Type

    conf

  • DOI
    10.1109/REAL.2002.1181584
  • Filename
    1181584