The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - October (2008 vol.20)
pp: 1363-1377
Nicolas Anciaux , INRIA, Le Chesnay
Luc Bouganim , INRIA, Le Chesnay
Philippe Pucheral , INRIA PRiSM, Le Chesnay Versailles
Patrick Valduriez , INRIA LINA, Nantes Nantes
ABSTRACT
Secure chips, e.g. present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. And they require embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices and trade-offs for different applications. Our solution is to use a benchmark for secure chip DBMS in order to (1) compare different database techniques, (2) predict the limits of on-chip applications, and (3) provide co-design hints. In this paper, we propose DiSC (Data management in Secure Chip), a benchmark which matches these three objectives. This work benefits from our long experience in developing and tuning data management techniques for the smart card. To validate DiSC, we compare the behavior of candidate data management techniques thanks to a cycle-accurate smart card simulator. Finally, we show the applicability of DiSC to future designs involving new hardware platforms and new database techniques.
INDEX TERMS
Database Management, Access methods, Query processing, Security, integrity, and protection
CITATION
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, Patrick Valduriez, "DiSC: Benchmarking Secure Chip DBMS", IEEE Transactions on Knowledge & Data Engineering, vol.20, no. 10, pp. 1363-1377, October 2008, doi:10.1109/TKDE.2008.67
REFERENCES
[1] N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, “PicoDBMS: Validation and Experience,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 2001.
[2] N. Anciaux, L. Bouganim, and P. Pucheral, “Memory Requirements for Query Execution in Highly Constrained Devices,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 2003.
[3] D. Bitton, D.J. DeWitt, and C. Turbyfil, “Benchmarking Database Systems: A Systematic Approach,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 1983.
[4] C. Bolchini, F. Salice, F. Schreiber, and L. Tanca, “Logical and Physical Design Issues for Smart Card Databases,” J. ACM Trans. Information Systems, vol. 21, no. 3, 2003.
[5] L. Bouganim, N. Dieu, and P. Pucheral, “MobiDiQ: Mobile Digital Quietude,” Gold Award of Simagine Int'l Contest, 2005.
[6] M.J. Carey, D. DeWitt, and J. Naughton, “The OO7 Benchmark,” Proc. ACM SIGMOD, 1993.
[7] R. Cattell and J. Skeen, “Object Operations Benchmark,” J. ACM Trans. Database Systems, vol. 17, no. 1, 1992.
[8] Common Criteria, “Common Criteria for Information Technology Security Evaluation Part 1,” CCIMB-2005-08-001, 2005.
[9] E. Damiani, S. De Capitani Di Vermicati, S. Paraboschi, and P. Samarati, “A Fine-Grained Access Control System for XML Documents,” J. ACM Trans. Information and System Security, vol. 5, no. 2, 2002.
[10] J.G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. Doorn, and S.W. Smith, “Building the IBM 4758 Secure Coprocessor,” Computer, vol. 34, no. 10, Oct. 2001.
[11] B. Finance, S. Medjoub, and P. Pucheral, “The Case for Access Control on XML Relationships,” Proc. ACM Int'l Conf. Information and Knowledge Management (CIKM), 2005.
[12] G. Graefe, “Query Evaluation Techniques for Large Databases,” J.ACM Computing Surveys, vol. 25, no. 2, 1993.
[13] J. Gray, The Benchmark Handbook for Database and Transaction Processing Systems. Morgan Kaufmann, 1991.
[14] R. Gupta, S. Dey, and P. Marwedel, “Embedded System Design and Validation: Building Systems from IC Cores to Chips,” Proc. Int'l Conf. VLSI Design (VLSI), 1998.
[15] J. Karlsson, A. Lal, C. Leung, and T. Pham, “IBM DB2 Everyplace: A Small Footprint Relational Database System,” Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2001.
[16] W. Kim, “Smart Cards: Status, Issues, US Adoption,” J. Object Technology, vol. 3, no. 5, 2004.
[17] D.L. Maloney, “Card Technology in Healthcare,” Proc. CardTech SecurTech (CTST), 2001.
[18] Mastercard, MasterCard Open Data Storage (MODS), 2002.
[19] M. Missikoff and M. Scholl, “Relational Queries in a Domain Based DBMS,” Proc. ACM SIGMOD, 1983.
[20] ISO/IEC 21000-5-2004 Standard, MPEG-21 Right Expression Language (MPEG-REL), 2004.
[21] Open Digital Rights Language Initiative, www.odrl.net, 2006.
[22] Oracle Corporation, Oracle 9i lite: Release Notes—Release 5.0.1, 2002.
[23] O. Potonniée, “A Decentralized Privacy-Enabling TV Personalization Framework,” Proc. European Conf. Interactive Television (EuroITV), 2004.
[24] P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, “PicoDBMS: Scaling Down Database Techniques for the Smart Card,” J. Very Large Data Bases, vol. 10, nos. 2-3, 2001.
[25] P. Pucheral, J.-M. Thevenin, and P. Valduriez, “Efficient Main Memory Data Management Using the DBGraph Storage Model,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 1990.
[26] SAP Standard Application Benchmarks, www.sap.com, 2006.
[27] A.R. Schmidt, F. Waas, M.L. Kersten, M.J. Carey, I. Manolescu, and R. Busse, “XMark: A Benchmark for XML Data Management,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 2002.
[28] B. Schneier and A. Shostack, “Breaking Up Is Hard to Do: Modeling Security Threats for Smart Cards,” Proc. Usenix Symp. Smart Cards, 1999.
[29] P. Seshadri and P. Garrett, “SQLServer for Windows CE-A Database Engine for Mobile and Embedded Platforms,” Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2000.
[30] Smart Card Alliance, HIPAA Compliance and Smart Cards: Solutions to Privacy and Security Requirements, www.smartcardalliance.org, 2003.
[31] The SmartRight Content Protection System, www.smartright.org, 2006.
[32] Sybase Inc., The Next Generation Database for Embedded Systems, white paper, 2000.
[33] Trusted Computing Group, www.trustedcomputing.org, 2006.
[34] Transaction Processing Performance Council, www.tpc.org, 2006.
[35] TPC Benchmark H, www.tpc.org/tpch/spectpch2.3.0.pdf, 2006.
[36] P. Valduriez, “Join Indices,” ACM Trans. Database Systems, vol. 12, no. 2, 1987.
[37] H. Vogt, M. Rohs, and R. Kilian-Kehr, Middleware for Communications, chapter 16. John Wiley & Sons, 2003.
[38] XrML eXtendible Rights Markup Language, www.xrml.org, 2006.
[39] H. Yu, D. Agrawal, and A. El Abbadi, “Tabular Placement of Relational Data on MEMS-Based Storage Devices,” Proc. Int'l Conf. Very Large Data Bases (VLDB), 2003.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool