Title :
STAR: secure real-time transaction processing with timeliness guarantees
Author :
Kang, Kyoung-Don ; Son, Sang H. ; Stankovic, John A.
Author_Institution :
Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
Abstract :
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., trade secret, manufacturing, or operational data, between transactions belonging to different security levels. Further transactions should be committed within their deadlines, i.e., before the market, manufacturing, or battlefield status changes. In this paper we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions to remain below a certain threshold. In our approach, mandatory access control mechanisms are applied for security purposes. QoS management, admission control, and feedback control schemes are applied to support certain guarantees on the miss ratio against potential overload and data conflicts. A detailed simulation study shows that our approach can support the specified miss ratio preventing illegal information flows even in the presence of unpredictable workloads and varying degrees of data contention, whereas baseline approaches fail.
Keywords :
authorisation; database management systems; quality of service; real-time systems; transaction processing; QoS management; STAR; admission control; clearance levels; data conflicts; data contention; data items; deadline miss ratio; feedback control; illegal inter-level information flow prevention; mandatory access control mechanisms; overload; real-time database architecture; real-time databases; secure real-time transaction processing; security-critical applications; sensitive data; sensitivity levels; simulation; timeliness guarantees; unpredictable workloads; Access control; Agile manufacturing; Application software; Computer science; Data security; Delay; Information security; Military computing; Real time systems; Transaction databases;
Conference_Titel :
Real-Time Systems Symposium, 2002. RTSS 2002. 23rd IEEE
Print_ISBN :
0-7695-1851-6
DOI :
10.1109/REAL.2002.1181584