STAR: secure real-time transaction processing with timeliness guarantees

  title={STAR: secure real-time transaction processing with timeliness guarantees},
  author={Kyoung-Don Kang and Sang Hyuk Son and John A. Stankovic},
  journal={23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002.},
  • K. Kang, S. Son, J. Stankovic
  • Published 3 December 2002
  • Computer Science
  • 23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002.
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., trade secret, manufacturing, or operational data, between transactions belonging to different security… 

Secure Real-Time Transaction Processing with Timeliness Guarantees in Mobile Distributed Real-Time Database Systems

This paper presents a secure hybrid optimistic real-time concurrency control protocol (SHORTCC), which not only considers carefully the inherent characteristics of mobile environment and the timing constraints of time-critical applications, but also achieves data security without sacrificing real- time performance significantly.

Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems

  • K. KangS. Son
  • Computer Science
    12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06)
  • 2006
This work proposes a novel adaptive security policy in which the SoD can be degraded by decreasing the cryptographic key length for certain tasks, if necessary, to improve the success ratio under overload conditions.

Qos-aware real-time data management

A novel QoS management architecture that applies feedback co ntrol, flexible freshness management, and admission control schemes to support the required deadline miss ratio and data freshness even in the presence of unpredictable workloads and data access patterns is developed.

Towards security and QoS optimization in real-time embedded systems

A novel adaptive approach for security support in RTESs is proposed in which a RTES initially uses a relatively short cryptographic key to maximize the QoS, while increasing the key length when the security risk level is raised.

Dynamic Damage Recovery for Web Databases

A fine grained transaction log is built to record the extended read and write operations while user transactions are processing and captures damage spreading caused by extended read-write dependency between transactions.

Fine Grained Transaction Log for Data Recovery in Database Systems

  • Ge FuHong Zhu X. Wang
  • Computer Science
    2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
  • 2008
This paper introduces a concept of "extended read operations" and illustrates how the extended read operations would cause the damage spreading, and then a fine grained transaction log (FGTL) is proposed.

Priority inversion in DRTDBS: challenges and resolutions

The aim of this work is to develop new concurrency control protocols, commit protocols and to compare their performance with existing protocols for distributed real-time database systems.

Scheduling Shared Data Acquisition for Real-time Decision Making

  • T. ChengT. Abdelzaher
  • Business, Computer Science
    2019 IEEE 25th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
  • 2019
This paper investigates scheduling policies for the acquisition of possibly overlapping sets of data items required to make multiple decisions by different deadlines by exploiting the insights gained from observations and properties of the data acquisition scheduling problem followed by a heuristic algorithm.

The Design and Performance of Special Purpose Middleware: A Sensor Networks Case Study

It is demonstrated that reduced footprint can be achieved while maintaining or even improving real-time properties and evidence that empirical measurement using a representative application is crucial to guide selection of feature subsets from general purpose middleware is given.

On Maximizing Quality of Information for the Internet of Things: A Real-Time Scheduling Perspective (Invited Paper)

A novel scheduling model is proposed, where applications need multiple data items to make decisions, and where individual data items can be captured at different levels of quality, to meet decision deadlines and data validity constraints.



Secure Concurrency Control in Firm Real-Time Database Systems

This work identifies which among the previously proposed real-time CC protocols are capable of providing covert-channel-free security and proposes and evaluates GUARD, an adaptive admission-control policy designed to provide fairness with respect to the distribution of killed transactions across security levels.

Maintaining security in firm real-time database systems

This work proposes a new optimistic concurrency control algorithm for secure firm real-time databases and shows that the algorithm performs fairly well in terms of security and timeliness compared to a non-secure algorithm, and argues and show that achieving more security does not necessarily mean more sacrifice in real- time performance.

Integrating Security and Real-Time Requirements Using Covert Channel Capacity

A secure two-phase locking protocol is described and a scheme is proposed to allow partial violations of security for improved timeliness, a measure of the degree to which security is being satisfied by a system.

An adaptable security manager for real-time transactions

An adaptable security manager is developed to provide alternate levels of communications security to multiple users and to dynamically adapt to real-time performance conditions and the design and evaluation of the proposed security manager are presented.

Service differentiation in real-time main memory databases

  • K. KangS. SonJ. Stankovic
  • Computer Science
    Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. ISIRC 2002
  • 2002
A service differentiation architecture for real-time databases where transactions are classified into several service classes based on their importance and a certain data freshness guarantee is provided for the data accessed by timely transactions which finish within their deadlines.

Multilevel Secure Transaction Processing: Status and Prospects

The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and describes the results of research in multileVEL secure transaction processing, which includes research results and limitations in concurrency control, multilesvel transaction management, and secure commit protocols.

Scheduling real-time transactions: a performance evaluation

This thesis develops a new family of algorithms for scheduling real-time transactions and proposes new techniques for handling requests without deadlines and requests with deadlines simultaneously, finding that real- time disk scheduling algorithms can perform better than conventional algorithms.

Performance specifications and metrics for adaptive real-time systems

This work proposes a framework based on control theory for designing adaptive, real-time software systems based on specifications of desired dynamic behavior and develops a new algorithm based on two PID controllers that meet both the transient and steady-state performance requirements.

Applying update streams in a soft real-time database system

The various properties of updates and views (including staleness) that affect this tradeoff are discussed and four algorithms for scheduling transactions and installing updates in a soft real-time database are examined.

Imprecise Results: Utilizing Partial Comptuations in Real-Time Systems

A general model of imprecise computations using these techniques, as well as one which takes into account the influence of the environment, showing where the latter approach fits into this model.