STAR: Secure real-time transaction processing with timeliness guarantees

Kyoung Don Kang, Sang H. Son, John A. Stankovic

Research output: Contribution to conferencePaperpeer-review

14 Scopus citations

Abstract

Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., secret trade, manufacturing, or operational data, between transactions belonging to different security levels. Further, transactions should be committed within their deadlines, i.e., before the market, manufacturing, or battle field status changes. In this paper, we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions to remain below a certain threshold. In our approach, mandatory access control mechanisms are applied for security purposes. QoS management, admission control, and feedback control schemes are applied to support certain guarantees on miss ratio against potential overload and data conflicts. A detailed simulation study shows that our approach can support the specified miss ratio preventing illegal information flows even in the presence of unpredictable workloads and varying degrees of data contention, whereas baseline approaches fail.

Original languageEnglish
Pages303-314
Number of pages12
StatePublished - 2002
EventProceedings Real-Time Systems Symposium - Austin, TX, United States
Duration: 3 Dec 20025 Dec 2002

Conference

ConferenceProceedings Real-Time Systems Symposium
Country/TerritoryUnited States
CityAustin, TX
Period3/12/025/12/02

Fingerprint

Dive into the research topics of 'STAR: Secure real-time transaction processing with timeliness guarantees'. Together they form a unique fingerprint.

Cite this