This Article 
 Bibliographic References 
 Add to: 
Transaction Processing in Multilevel Secure Databases with Kernelized Architecture: Challenges and Solutions
September-October 1997 (vol. 9 no. 5)
pp. 697-708

Abstract—Multilevel security poses many challenging problems for transaction processing. The challenges are due to the conflicting requirements imposed by confidentiality, integrity, and availability—the three components of security. We identify these requirements on transaction processing in Multilevel Secure (MLS) database management systems (DBMSs) and survey the efforts of a number of researchers to meet these requirements. While our emphasis is primarily on centralized systems based on kernelized architecture, we briefly overview the research in the distributed MLS DBMSs as well.

[1] Information Security: An Integrated Collection of Essays, M.D. Abrams, S. Jajodia, and H.J. Podell, eds., IEEE CS Press, Los Alamitos, Calif., 1995.
[2] P. Ammann and S. Jajodia, "A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases," Database Security, V: Status and Prospects, C.E. Landwehr, ed., pp. 23-25,Amsterdam: NorthHolland, 1992.
[3] P. Ammann and S. Jajodia, "Planar Lattice Security Structures for Multi-Level Replicated Databases," Database Security VII: Status and Prospects, T. Keefe and C. Landwehr, eds., pp. 125-134. NorthHolland, 1994.
[4] P. Ammann, S. Jajodia, and P. Frankl, "Globally Consistent Event Ordering in One-Directional Distributed Environments," IEEE Trans. Parallel and Distributed Systems, vol. 7, no. 6, pp. 665-670, June 1996.
[5] V. Atluri, E. Bertino, and S. Jajodia, “Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols,” Database Security, VIII: Status and Prospects, J. Biskup et al., eds., pp. 259–274, 1994.
[6] V. Atluri, S. Jajodia, and E. Bertino, "Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 5, pp. 839-854, Oct. 1996.
[7] D.E. Bell and L.J. LaPadula, "Secure Computer Systems: Unified Exposition and Multics Interpretation," Technical Report No. MTR-2997, Mitre Corp., Bedford, Mass., Mar. 1976.
[8] P. Bernstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987.
[9] E. Bertino, S. Jajodia, L. Mancini, and I. Ray, "Advanced Transaction Processing in Multilevel Secure File Stores," IEEE Trans. Knowledge and Data Eng., to appear.
[10] Committee on Multilevel Data Management Security, Air Force Studies Board, National Research Council, Multilevel Data Management Security, National Academy Press, Washington, D.C., Mar. 1983.
[11] O. Costich, "Transaction Processing Using an Untrusted Scheduler in a Multilevel Database With Replicated Architecture," Database Security V: Status and Prospects, C. Landwehr and S. Jajodia, eds., NorthHolland, pp. 173-190, 1992.
[12] D.E.R. Denning, Cryptography and Data Security. Addison-Wesley, 1983.
[13] Digital Equipment Corp., Digital Time Service Functional Specification, Version T.1.0.5, 1989.
[14] Dept. of Defense Computer Security Center, Trusted Computer System Evaluation Criteria, Dec. 1985.
[15] V. Doshi and S. Jajodia, "Referential Integrity in Multilevel Secure Database Management Systems," G.G. Gable and W.J. Caelli, eds., IT Security: The Need for International Cooperation, pp 359-371.Amsterdam: North-Holland, 1992.
[16] J.N. Gray, R.A. Lorie, G.R. Putzolu, and I.L. Traiger, "Granularity of Locks and Degrees of Consistency in a Shared Data Base," G.M. Nijssen, ed., Modeling in Data Base Management Systems, pp. 365-394.Amsterdam: North-Holland, 1976.
[17] J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kauffman, 1993.
[18] S. Jajodia and V. Atluri, “Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases,” Proc. IEEE Symp. Security and Privacy, pp. 216–224, 1992.
[19] S. Jajodia and B. Kogan, “Transaction Processing in Multilevel Secure Databases Using Replicated Architecture,” Proc. IEEE Symp. Research in Security and Privacy, pp. 360–368, May 1990.
[20] S. Jajodia, L.V. Mancini, and I. Ray, “Secure Locking Protocols for Multilevel Database Management Systems,” Proc. IFIP 10th Working Conf. Database Security, pp. 177-194, July 1996.
[21] S. Jajodia and C. McCollum, "Using Two-Phase Commit for Crash Recovery in Federated Multilevel Secure Database Management Systems," Dependable Computing and Fault Tolerant Systems, C.E. Landwehr et al., eds., vol. 8, pp. 365-381.New York: Springer-Verlag, 1993.
[22] S. Jajodia, C.D. McCollum, and B.T. Blaustein, “Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases,” Database Security, VII: Status and Prospects, T.F. Keefe and C.E. Landwehr, eds., pp. 109–121, 1994.
[23] I.E., Kang and T.F. Keefe, "Transaction Management for Multilevel Secure Replicated Databases," J. Computer Security, vol. 3, pp. 115-145, 1995.
[24] I.E. Kang and T.F. Keefe, "On Transaction Processing for Multilevel Secure Replicated Databases," Proc. European Symp. Research in Computer Security, pp. 329-347,Toulouse, France, vol. 648, Lecture Notes in Computer Science, Springer-Verlag, 1992.
[25] T.F. Keefe and W.T. Tsai, “Multiversion Concurrency Control for Multilevel Secure Database Systems,” Proc. 10th IEEE Symp. Research in Security and Privacy, pp. 369-383, May 1990.
[26] L. Lamport, "Concurrent Reading and Writing," Comm. ACM, vol. 20, no. 11, pp. 806-811, Nov. 1997.
[27] L. Lamport, "Time, clocks and the ordering of events in a distributed system," Comm. ACM, vol. 21, no. 7, pp. 558-565, July 1978.
[28] C.E. Landwehr, "Formal models for computer security," ACM Computing Survey, vol. 13, no. 3, pp. 247-278, Sept. 1981.
[29] B. Liskov, "Practical Uses of Synchronized Clocks in Distributed Systems," Proc. 10th ACM Symp. Principles of Distributed Computing, pp. 1-9, Aug. 1991.
[30] B. Maimone and R. Allen, "Methods for Resolving the Security vs. Integrity Conflict," Proc. Fourth RADC Database Security Workshop,Little Compton, R.I., Apr. 1991.
[31] W.T. Maimone and I.B. Greenberg,"Single-level multiversion schedulers for multilevel secure database systems," Proc. Sixth Ann. Computer Security Applications Conf., pp. 137-147,Tucson, Ariz., Dec. 1990.
[32] D. McCullough,"A hookup theorem for multilevel security," IEEE Trans. Software Engineering, vol. 16, pp. 563-568, June 1990.
[33] J. McDermott and S. Jajodia, “Orange Locking: Channel-Free Database Concurrency Control via Locking,” Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 267–284, 1993.
[34] C. Meadows and S. Jajodia, "Integrity vs. Security in Multi-Level Secure Databases," C.E. Landwehr, ed., Database Security, Status, and Prospects, pp. 89-101.Amsterdam: North-Holland, 1988.
[35] D.L. Mills, Network Time Protocol (Version 3) Specification, Implementation, Analysis, DARPA Networking Group Report, July 1990.
[36] C. Mohan, B. Lindsay, and R. Obermarck, “Transaction Management in R* Distributed Database Management System,” ACM Trans. Database Systems, vol. 11, no. 4, pp. 378–396, Dec. 1986.
[37] I. Ray, E. Bertino, S. Jajodia, and L. Mancini, "An Advanced Commit Protocol for MLS Distributed Database Systems," Proc. Third ACM Conf. Computer and Comm. Security,New Delhi, India, pp. 119-128, Mar. 1996.
[38] D.P. Reed and R.K. Kanodia, "Synchronization with Eventcounts and Sequencers," Comm. ACM, vol. 22, no. 2, pp. 115-123, Feb. 1979.
[39] M. Schaefer, "Quasi-Synchronization of Readers and Writers in a Secure Multi-Level Environment," Technical Report No. TM-5407/003, System Development Corp., Sept. 1974.
[40] J.W. Stamos and F. Cristian, “Coordinator Log Transaction Execution Protocol,” Distributed and Parallel Databases, vol. 1, pp. 383–408, 1993.

Index Terms:
Database systems, transaction processing , security, concurrency control, mandatory access control, covert channel, kernelized architecture, replicated architecture.
Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino, "Transaction Processing in Multilevel Secure Databases with Kernelized Architecture: Challenges and Solutions," IEEE Transactions on Knowledge and Data Engineering, vol. 9, no. 5, pp. 697-708, Sept.-Oct. 1997, doi:10.1109/69.634749
Usage of this product signifies your acceptance of the Terms of Use.