Survey on Database Concurrency Control in Multilevel Secure Database Management Systems

Sakil Ahmad Ansari, Jaychand Vishwakarma


Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure

Full Text:



D. E. Bell and L. J. LaPadula, “Secure computer systems: Unified exposition and multics interpretations,” Tech. Rep. MTR-2997, Mitre Corp., Mar. 1976.

. A. Bemstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems. Reading, MA: Addison- Wesley, 1987.

Proc. Isr Workshop Covert Channel Analysis, Cipher Newsletter, (Special Issue), Tech. Comm. Security and Privacy, IEEE Comput. Soc., July 1990.

0. Costich, “Transaction processing using an untrusted scheduler in a multilevel database with replicated architecture,” in Proc. IFIP WG 11.3, 5th Working Conf. Database Security, Shepherdstown, WV, Nov. 1991.

C. J. Date, An Introduction to Database System. Reading MA: Addison- Wesley, MA: 1986.

Department of Defense Computer Security Center, “Department of defense trusted computed system evaluation criteria,” DOD 5200.28- STD, Dec. 1985.

A. R. Downing, I. B. Greenberg, and T. F. Lunt, ‘‘Issues in distributed database security,’’ in Proc. 5th Annu. Comput. Security Applicar. Conf., Tucson, AZ, Dec. 1989, pp. 196-203.

M. Gasser, Building a Secure Computer. New York: Van Nostrand Reinhold, 1988.

J. A. Goguen and J. Meseguer, “Security policy and security models” in Proc. IEEE Symp. Security, Privacy, 1982, pp. 11-20.

“Unwinding and inference control,” in Proc. IEEE Symp. Security, Privacy. 1984, pp. 75-86.

J. T. Haigh and W. D. Young, “Extending the noninterference version of MLS for SAT,” IEEE Trans. Software Eng., vol. SE-13, pp. 141-150, Feb. 1987.

J. T. Haigh, R. A. Kemmerer, J. McHugh, and W. D. Young, “An experience using two covert channel analysis techniques on a real system design,” IEEE Trans. Sofware Eng., vol. SE-13, pp. 157-168, Feb. 1987.

T. Haigh, P. D. Stachour, P. A. Dwyer, E. Onuegbe, and M. B. Thuraisingham, “Secure distributed data views (LDV): Implementation specification for a database management system,” A005: Interim Rep., Honeywell, May 1988.

T. Hinke and M. Schaefer, “Secure data management system,” RADC-TR-75-266 Final Rep., Syst. Develop. Corp., Nov. 1975.

S. Jajodia and B. Kogan, “Transaction processing in multilevel-secure database using replicated architecture,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1990, pp. 360-368.

T. F. Keefe, W. T. Tsai, and M. B. Thuraisingham, “SODA: A secure object-oriented database system,” Computers & Security, vol. 8, no. 6, pp. 517-533, Oct. 1989.

T. F. Keefe, D. J. Thomsen, W. T. Tsai, and M. Hansch, “Multiparty update conflict: The problem and its solution,” in Proc. 5th Annu. Comput. Security Applicat. Conf., Tucson, AZ, Dec. 1989, pp. 222-231.

T. F. Keefe and W. T. Tsai, “Multiversion concurrency control for multilevel secure database systems,” in Proc. 1990 IEEE Symp. Res. Security. Privacy, Oakland CA, May 1990, pp. 369-383.

T. F. Keefe, “Multilevel secure database management systems,” Ph.D. dissertation, Univ. Minnesota, Minneapolis, 1990.1201 H. T. Kung and J. T. Robinson, “On optimistic methods for concurrency control,” ACM Trans. Database Syst., vol. 6, no. 2, pp. 213-226, 1981.

C. E. Landwehr, “Formal models for computer security,” Computing Surveys, vol. 13, no. 3, pp. 247-278, Sept. 1981; reprinted in Advances in Computer Security, vol. 2, R. Turn, Ed. Dedham, MA:Artech House, 1981, pp. 76-107.

T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley, “The Sea View security model,” IEEE Trans. Software Eng., vol. 16, pp. 593-607, June 1990.

W. T. Maimone and 1. B. Greenberg, “Single-level multiversion schedulers for multilevel secure database systems,” in Proc. 6th Annu. Comput. Security Applicat. Conf., Tucson, AZ, Dec. 1990, pp. 137-147

D. McCullough, “A hookup theorem for multilevel security,” IEEE Trans. Sofrware Eng., vol. 16, pp. 563-568, June 1990.

“Oracle RDBMS: Database administrator’s guide version 6.0,” Oracle Corp. Belmont, CA, 1989.

C. Papadimitriou, The Theory of Database Concurrency Control. Rockville, MD: Comput. Sci. Press, 1986.

D. P. Reed and R. K. Kanodia, “Synchronization with Eventcounts and Sequencers,” Commun. Assoc. Compur. Mach., vol. 22, no. 2, pp. 115-123, Feb. 1979.

W. R. Shockley, D. Warren, T. C. Cheung, and D. R. Schell, “Secure distributed data views system specification,” RAW-TR-89-3 13, vol. V, Final Tech. Rep., Comput. Sci. Lab., SRI International, Menlo Park, CA, Dec. 1989

J. D. Ullman, Principles of Database and Knowledge-Base Systems: Vol. 1. Rockville, MD: Comput. Sci. Press, 1988.

L. Vetter, G. Smith, and T. F. Lunt, “TCB subsets: the next step,” in Proc. 5th Annu. Comput. Security Applicat. Conf., Tucson, AZ, Dec. 1989, pp. 216-221.

J . T. Wittbold and D. M. Johnson, “Information flow in nondeterministic systems,” in Proc. 1990 IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1990, pp. 144-161.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.