Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Secure Transaction Processing

  • Indrakshi Ray
  • Thilina Buddhika
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_331

Synonyms

Cloud Computing; Database Security; Data Confidentiality; Privacy; Multilevel Secure Database Management System; Transaction Processing

Definition

Secure transaction processing refers to execution of transactions that cannot be exploited to cause security breaches.

Historical Background

Research in making transaction processing secure has progressed along different directions. Early research in this area was geared toward military applications. Such applications are characterized by having a set of security levels which are partially ordered using the dominance relation. Information is transmitted through read and write operations on data items belonging to the various levels. Information is allowed to flow from a dominated level to a dominating level but all other flows are illegal. Traditional concurrency control and recovery algorithms cause illegal information flow. Most research in this area involved providing new architectures, concurrency control, and recovery...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Ahmed Q, Vrbsky S. Maintaining security in firm real-time database systems. In: Proceedings of the 14th Annual Computer Security Applications Conference; 1998.Google Scholar
  2. 2.
    Ammann P, Jaeckle F, Jajodia S. A two-snapshot algorithm for concurrency control in secure multi-level databases. In: Proceedings of the IEEE Symposium on Security and Privacy; 1992. p. 204–15.Google Scholar
  3. 3.
    Ammann P, Jajodia S. Distributed timestamp generation in planar lattice networks. ACM Trans Comput Syst. 1993;11(3):205–25.CrossRefGoogle Scholar
  4. 4.
    Ammann P, Jajodia S. An efficient multiversion algorithm for secure servicing of transaction reads. In: Proceedings of the 1st ACM Conference on Computer and Communication Security; 1994. p. 118–25.Google Scholar
  5. 5.
    Ammann P, Jajodia S, Frankl P. Globally consistent event ordering in one-directional distributed environments. IEEE Trans Parallel Distrib Syst. 1996;7(6):665–70.CrossRefGoogle Scholar
  6. 6.
    Ammann P, Jajodia S, Liu P. Recovery from malicious transactions. IEEE Trans Knowl Data Eng. 2002;14(5):1167–85.CrossRefGoogle Scholar
  7. 7.
    Ammann P, Jajodia S, McCollum C, Blaustein B. Surviving information warfare attacks on databases. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy; 1997.Google Scholar
  8. 8.
    Atluri V, Bertino E, Jajodia S. Degrees of isolation, concurrency control protocols, and commit protocols. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security; 1995. p. 259–74.Google Scholar
  9. 9.
    Atluri V, Huang W-K. Enforcing mandatory and discretionary security in workflow management systems. J Comput Secur. 1997;5(4):303–40.CrossRefGoogle Scholar
  10. 10.
    Atluri V, Huang W-K, Bertino E. A semantic-based execution model for multilevel secure workflows. J Comput Secur. 2000;8(1):3–42.CrossRefGoogle Scholar
  11. 11.
    Atluri V, Jajodia S, Keefe TF, McCollum C, Mukkamala R. Multilevel secure transaction processing: status and prospects. In: Proceedings of the 10th IFIP WG11.3 Working Conference on Database Security. Como; 1996.Google Scholar
  12. 12.
    Bell DE, LaPadula LJ. Secure computer system: unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corporation, Bedford; 1975.Google Scholar
  13. 13.
    Biswas D, Vidyasankar K. Secure cloud transactions. Comput Syst Sci Eng. 2013;28(6):439–48.Google Scholar
  14. 14.
    Blaustein BT, Jajodia S, McCollum CD, Notargiacomo L. A model of atomicity for multilevel transactions. In: Proceedings of the IEEE Symposium on Research in Security and Privacy; 1993. p. 120–34.Google Scholar
  15. 15.
    Costich O. Transaction processing using an untrusted scheduler in a multilevel database with replicated architecture. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security; 1992. p. 173–90.Google Scholar
  16. 16.
    Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N. Relational cloud: a database service for the cloud. In: Proceedings of the 5th Biennial Conference on Innovative Data Systems Research; 2011. p. 235–40.Google Scholar
  17. 17.
    George B, Haritsa JR. Secure concurrency control in firm real-time database systems. Distrib Parallel Databases. 2000;8(1):41–83.CrossRefGoogle Scholar
  18. 18.
    Iskander MK, Wilkinson DW, Lee AJ, Chrysanthis PK. Enforcing policy and data consistency of cloud transactions. In: Proceedings of the 31st International Conference on Distributed Computing Systems Workshops; 2011. p. 253–62. IEEE.Google Scholar
  19. 19.
    Jajodia S, Atluri V. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. In: Proceedings of the IEEE Symposium on Security and Privacy; 1992. p. 216–24.Google Scholar
  20. 20.
    Jajodia S, Kogan B. Integrating an object-oriented data model with multilevel security. In: Proceedings of the IEEE Symposium on Security and Privacy; 1990. p. 76–85.CrossRefGoogle Scholar
  21. 21.
    Kang IE, Keefe TF. Transaction management for multilevel secure replicated databases. J Comput Secur. 1995;3(2/3):115–45.CrossRefGoogle Scholar
  22. 22.
    Kang K, Son SH, Stankovic J. STAR: secure real-time transaction processing with timeliness guarantees. In: Proceedings of the 23rd IEEE Real-time Systems Symposium; 2002.Google Scholar
  23. 23.
    Keefe TF, Tsai WT. Multiversion concurrency control for multilevel secure databases. In: Proceedings of the IEEE Symposium on Security and Privacy; 1990. p. 369–83Google Scholar
  24. 24.
    Lala C, Panda B. Evaluating damage from cyber attacks: a model and analysis. IEEE Trans Syst Man Cybern Part A. 2001;31(4):300–10.CrossRefGoogle Scholar
  25. 25.
    Lamport L. Concurrent reading and writing. Commun ACM. 1977;20(11):806–11.MathSciNetzbMATHCrossRefGoogle Scholar
  26. 26.
    Liu P, Hao X. Efficient damage assessment and repair in resilient distributed database systems. In: Proceedings of the 15th IFIP WG11.3 Working Conference on Data and Application Security; 2001. p. 75–89.CrossRefGoogle Scholar
  27. 27.
    Liu P, Jajodia S. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop; 2001.Google Scholar
  28. 28.
    Maimone WT, Greenberg IB. Single-level multiversion schedulers for multilevel secure database systems. In: Proceedings of the 6th Annual Computer Security Applications Conference; 1990. p. 137–47.Google Scholar
  29. 29.
    McDermott J, Jajodia S, Sandhu R. A single-level scheduler for replicated architecture for multilevel secure databases. In: Proceedings of the 7th Annual Computer Security Applications Conference; 1991. p. 2–11.Google Scholar
  30. 30.
    OASIS. Web services security: SOAP message security, 2; 2006.Google Scholar
  31. 31.
    OASIS.WS-SecureConversation, 3; 2007.Google Scholar
  32. 32.
    OASIS.Web services atomic transaction, 2; 2009.Google Scholar
  33. 33.
    OASIS. WS-Trust, 4; 2012.Google Scholar
  34. 34.
    Pal S. A locking protocol for multilevel secure databases providing support for long transactions. In: Proceedings of the 10th IFIP WG11.3 Working Conference on Database Security; 1996. p. 183–98.Google Scholar
  35. 35.
    Panda B, Giordano J. Reconstructing the database after electronic attacks. In: Proceedings of the 12th IFIP WG11.3 International Working Conference on Database Security; 1998.Google Scholar
  36. 36.
    Panda B, Haque KA. Extended data dependency approach: a robust way of rebuilding database. In: Proceedings of the 2002 ACM Symposium on Applied Computing; 2002.Google Scholar
  37. 37.
    Park C, Park S, Son SH. Multiversion locking protocol with freezing for secure real-time database systems. IEEE Trans Knowl Data Eng. 2002;14(5):1141–54.CrossRefGoogle Scholar
  38. 38.
    Popa RA, Redfield C, Zeldovich N, Balakrishnan H. Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 12rd ACM Symposium on Operating Systems Principles; 2011. p. 85–100. ACMGoogle Scholar
  39. 39.
    Ray I, Ammann P, Jajodia S. A semantic-based transaction processing model for multi-level transactions. J Comput Secur. 1998;6(3):181–217.CrossRefGoogle Scholar
  40. 40.
    Ray I, Bertino E, Jajodia S, Mancini L. An advanced commit protocol for MLS distributed database systems. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security; 1996. p. 119–28.Google Scholar
  41. 41.
    Ray I, McConnell RM, Lunacek M, Kumar V. Reducing damage assessment latency in survivable databases. In: Proceedings of the 21st British National Conference on Databases; 2004.Google Scholar
  42. 42.
    Reed DP, Kanodia RK. Synchronizations with event counts and sequencers. Commun ACM. 1979;22(5):115–23.zbMATHCrossRefGoogle Scholar
  43. 43.
    Schaefer M. Quasi-synchronization of readers and writers in a multi-level environment. Technical Report TM-5407/003, System Development Corporation; 1974.Google Scholar
  44. 44.
    Smith KP, Blaustein BT, Jajodia S, Notargiacomo L. Correctness criteria for multilevel secure transactions. IEEE Trans Knowl Data Eng. 1996;8(1):32.CrossRefGoogle Scholar
  45. 45.
    Son SH, Mukkamala R, David R. Integrating security and real-time requirements using covert channel capacity. IEEE Trans Knowl Data Eng. 2000;12(6):865–79.CrossRefGoogle Scholar
  46. 46.
    Tan CC, Liu Q, Wu J. Secure locking for untrusted clouds. In: Proceedings of the IEEE International Conference on Cloud Computing; 2011. p. 131–8.Google Scholar
  47. 47.
    Williams P, Sion R, Shasha D. The blind stone tablet: outsourcing durability to untrusted parties. In: Proceedings of the Network Distributed System Security Symposium; 2009.Google Scholar
  48. 48.
    Wu J. Distributed system design. Boca Raton: CRC Press; 1998.Google Scholar
  49. 49.
    Yu M, Liu P, Zang W. Multi-version attack recovery for workflow systems. In: Proceedings of the 9th Annual Computer Security Applications Conference; 2003. p. 142–51Google Scholar
  50. 50.
    Zhu Y, Xin T, Ray I. Recovering from malicious attacks in workflow systems. In: Proceedings of the 16th International Conference on Database and Expert Systems; 2005.Google Scholar
  51. 51.
    Zuo Y, Panda B. Damage discovery in distributed database systems. In: Proceedings of the 18th IFIP WG11.3 Working Conference on Data and Applications Security; 2004.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Colorado State UniversityFort CollinsUSA