A transaction length-sensitive protocol based on altruistic locking for multilevel secure database systems

  • Hee Wan Kim
  • , Hae Kyung Rhee
  • , Tai M. Chung
  • , Young Ik Eom
  • , Ung Mo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We propose a transaction length-sensitive protocol based on altruistic locking to satisfy the security requirements and improve the degree of concurrency for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed for extended altruistic locking. We adapted XAL to multilevel secure database and we investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.

Original languageEnglish
Title of host publicationInformation and Communications Security - 3rd International Conference, ICICS 2001, Proceedings
EditorsSihan Qing, Tatsuaki Okamoto, Jianying Zhou
PublisherSpringer Verlag
Pages107-118
Number of pages12
ISBN (Print)3540428801, 9783540428800
DOIs
StatePublished - 2001
Event3rd International Conference on Information and Communications Security, ICICS 2001 - Xian, China
Duration: 13 Nov 200116 Nov 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2229
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information and Communications Security, ICICS 2001
Country/TerritoryChina
CityXian
Period13/11/0116/11/01

Fingerprint

Dive into the research topics of 'A transaction length-sensitive protocol based on altruistic locking for multilevel secure database systems'. Together they form a unique fingerprint.

Cite this