Abstract
Many real-time database systems are contained in environments that exhibit restricted access to information, such as government agencies, hospitals and military institutions, where mandatory access control for security is required. In addition to such security constraints, real-time database systems have real-time integrity constraints. These real-time constraints require deadlines to be met and data to be temporally consistent. Conventional multi-level secure database models are inadequate for time-critical applications and conventional real-time database models do not support security constraints. We propose a new concurrency control algorithm for secure real-time databases. We implement the algorithm and study the performance using a real-time database system simulation model. Results show that the algorithm performs fairly well in terms of security and timeliness compared to the non-secure algorithm. We argue and show that achieving more security does not necessarily mean a great deal of sacrifice in maintaining real-time constraints.
Chapter PDF
Similar content being viewed by others
References
Abbott, R. and Garcia-Molina, H. (1992) Scheduling Real-Time Transactions: A Performance Evaluation, ACM Transactions on Database Systems, 17, 513560.
Bell, D.E. and LaPadula, L.J. (1974) Secure Computer Systems: Mathematical Foundations and Model, in Technical Report, MITRE Corporation.
David, R.,Son, S.H., and Mukkamala, R. (1995) “Supporting Security requirements in Multilevel Real-Time Databases,” in Proceedings IEEE Symposium on Security and Privacy, Oakland, CA, 199–210.
Denning, D.E. (1988) The Sea View Security Model, in Proceedings IEEE Symposium on Security and Privacy, Oakland, Ca.
George, B. and Haritsa, J. (1997) Secure Transaction Processing in Firm Real-Time Database Systems, in Proceedings SIGMOD, 462–473.
Jajodia, S. and Sandhu, R. (1991) (Toward a Multilevel Secure Relational Data Model, in Proceedings ACM SIGMOD, Denver, Colorado, May, ACM, New York, 50–59.
Liu, C. L. and Layland, J.W. (1979) Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment, Journal of the ACM, 20 (1), 46–61.
Moskowitz, I.S. and Miller, A.R. (1994) Simple Timing Channels, in Proceedings of the IEEE Symposium on Security, 56–64.
Ozsoyoglu, G. and Snodgrass, R.T. (1995) Temporal and Real-Time Databases: A Survey. IEEE Transactions on Knowledge and Data Engineering,7(4), 513532.
Qian, X. (1994), Inference Channel-Free Integrity Constraints in Multilevel Relational Databases, Proceedings of the IEEE Symposium on Security, 158167.
Ramamritham, K. (1993) “Real-Time Databases,” International Journal of Distributed and Parallel Databases, 199–226.
Son, S.H., David, R. and Thuraisingham, B. (1995) An Adaptive Policy for Improved Timeliness in Secure Database Systems, in Proceedings of Annual IFIP WG 11.3 Conference of Database Security.
Wolfe, V.F. and DePippo, L.C. (1997) Real-Time Database Systems, in Database Systems Handbook (ed. P. J. Fortier).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ahmed, Q.N., Vrbsky, S.V. (1998). Maintaining integrity constraints and security in real-time database systems. In: Jajodia, S., List, W., McGregor, G.W., Strous, L.A.M. (eds) Integrity and Internal Control in Information Systems. IICIS 1998. IFIP — The International Federation for Information Processing, vol 9. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35396-8_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-35396-8_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5533-6
Online ISBN: 978-0-387-35396-8
eBook Packages: Springer Book Archive