Advertisement

Concurrency Control for Multilevel Secure Distributed Real-Time Databases

  • Valuchandhar Vadivelu
  • S. Albert Rabara
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 28)

Abstract

The technology evaluation of database management system has integrated with significant improvement in distributed computing. The requirements for multilevel security have been shown to conflict with database integrity and consistency. Concurrency control ensures that individual users meet consistent states of the databases with security. Concurrency control is an integral part of the database systems to manage the concurrent execution of operations by different transactions in the same data or distributed data with consistency. In this paper, it is proposed a model to enhance the performance of concurrent transactions for multilevel security for distributed database. This model reduces the data access time and wait time for every transaction monitored by the sub-query analyzer. The simulation study reveals the effective enhancement of performance for concurrent transactions with different levels of security.

Keywords

Security Level Unit Tree Concurrency Control Security Manager Transaction Manager 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bertino E, Sandhu R (2005) Database security – concepts, approches, and challenges. IEEE Trans Dependable and Secure Comput 2(1):2–19CrossRefGoogle Scholar
  2. 2.
    Tamper Ozsu M, Valduriez Patrick (1996) Distributed and parallel database systems. ACM Computing Surveys 28(1)Google Scholar
  3. 3.
    Slack James M (1993) Security in an object-oriented databases. Proceedings of the of ACM Transactions, pp 155–159Google Scholar
  4. 4.
    Tajimia Keishi (1996) Static detection of security flaws in OODBMS. RIFMS, Kyoto University Japan. In: ACM SIGMOD international conference on management of data. SIGMOD96, 25(2):341–352CrossRefGoogle Scholar
  5. 5.
    Null Linda M (1992) The DIAMOND security policy for object-oriented databases. In: ACM annual Conference on Communicaions, pp 49–56Google Scholar
  6. 6.
    Jajodia S, Kogan B, Sandhu Ravi S A Multilevel Secure Object-Oriented Data Model. In: Proceedings of ACM SIGMOD, pp 596-616.Google Scholar
  7. 7.
    Thomas Roshan K, Sandhu Ravi S (1993) A kernelized architecture for multilevel secure object-oriented databases supporting write-up. J Comput SecurGoogle Scholar
  8. 8.
    Bertino E, Catania B, Ferrari E (2001) A nested transaction model for multilevel secure database management systems. ACM Trans Inf Sys Secur 4(4):321–370CrossRefGoogle Scholar
  9. 9.
    Lin W, Nolte J (1983) Basic timestamp, multiple version timestamp, and two-phase locking. In: Proceedings of 9th international conference on VLDB Conference, Florence, ItalyGoogle Scholar
  10. 10.
    Kaur N, Sarje AK, Misra M (2004) Performance evaluation of concurrency control algorithm for multillevel secure distributed databases. IEEE Compter SocietyGoogle Scholar
  11. 11.
    Xeoing M et al. (2002) Mirror: A state consciious concurrency control protocol for replicated real time database. J Inf Sys 27:277–297CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Valuchandhar Vadivelu
    • 1
  • S. Albert Rabara
  1. 1.Department of Computer ScienceSt. Joseph’s College (Autonomous)Tiruchirappalli–India

Personalised recommendations