Abstract
This paper presents a locking protocol for multilevel secure databases which produces schedules that are 1—copy serializable and satisfy the MLS property. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot is upgraded to the most recently committed database version.
The protocol supports long read—only transactions that perform their read downs during a single version period but continue to execute same—level reads thereafter. The protocol also supports long update transactions that perform a batch of read downs close to their commit point, and commit during the same version period.
Chapter PDF
Similar content being viewed by others
References
P. Ammann, F. Jaeckle, and S. Jajodia. A Two—Snapshot Algorithm for Concurrency Control In Multi—Level Secure Databases. In Proceedings of 1992 IEEE Symposium on Research in Security and Privacy, pages 204–215, Oakland, CA, May 1992.
P. Ammann and S. Jajodia. A Timestamp Ordering Algorithm for Secure, Single—Version Multilevel Databases. In C. E. Landwehr and S. Jajodia, editors, Database Security V: Status and Prospects, pages 191–202. North—Holland, Amsterdam, 1992.
P. Ammann and S. Jajodia. An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. In Proceedings of Second ACM Conference on Computer and Communications Security, pages 118–125, November 1994.
D. E. Bell and L. J. La Padula. Secure Computer Systems: Unified Exposition and Multics Interpretations. Technical Report MTR-2997, MITRE Corporation, March 1976.
P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison—Wesley, Reading, MA, 1987.
A. R. Downing, I. B. Greenberg, and T. F. Lunt. Issues in Distributed Database Security. In Proceedings of Fifth Annual Computer Security Applications Conference, pages 196–203, Tucson, AZ, December 1989.
J. Goguen and J. Meseguer. Security Policies and Security Models. In Proceedings of IEEE Symposium on Security and Privacy, pages 11–22, 1982.
J. Gray. Operating Systems — An Advanced Course, volume 60 of Lecture Notes on Computer Science, chapter Notes on Data Base Operating Systems. Springer—Verlag, 1978. R. Bayer, R. Graham and G. Seegmuller (eds.).
J. N. Gray. The Transaction Concept: Virtues and Limitations. In Proceedings of the 7th International Conference on Very Large Data Bases, pages 144–154, Cannes, France, August 1981.
J. T. Haigh and W. D. Young. Extending the Noninterference Version of MLS for SAT. IEEE Transactions on Software Engineering, SE-13(2): 141–150, February 1987.
T. F. Keefe and W. T. Tsai. A Multiversion Transaction Scheduler for Centralized Multilevel Secure Database Systems. Computer Science and Engineering Department Tech. Report CSE-94–001, The Pennsylvania State University, June 1994.
W. T. Maimone and I. B. Greenberg. Single—Level Multiversion Schedulers for Multilevel Secure Database Systems. In Proceedings of Sixth Annual Computer Security Applications Conference, pages 137–147, Tucson, AZ, December 1990.
J. McDermott and S. Jajodia. Orange Locking: Channel—Free Database Concurrency Control Via Locking. In Proceedings of IFIP Sixth Working Conference on Database Security, pages 271–288, Vancouver, British Columbia, August 1992.
S. Pal. A Locking Protocol for Multilevel Secure Databases Using Two Committed Versions. In Proceedings of the Tenth Annual Conference on Computer Assurance, pages 197–210, Gaithersburg, MD, June 1995.
D. I’. Reed and R. K. Kanodia. Synchronization with Eventcounts and Sequencers. Communications of the ACM, 22 (2): 115–123, February 1979.
K. Salem, H. Garcia-Molina, and J. Shands. Altruistic Locking. ACM Transactions on Database Systems, 19 (1): 117–165, March 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Pall, S. (1996). A Locking Protocol for MLS Databases Providing Support For Long Transactions. In: Spooner, D.L., Demurjian, S.A., Dobson, J.E. (eds) Database Security IX. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34932-9_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-34932-9_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2954-1
Online ISBN: 978-0-387-34932-9
eBook Packages: Springer Book Archive