channels are paths not normally meant for
information flow. In multilevel secure databases, a
low security level transaction can be delayed or
aborted by a high security level transaction due to
shared data access. Thus, by delaying low security
level transactions in a predetermined manner, high
security level information can be indirectly
transferred to the lower security level. This is called
a covert channel. Direct leakage can be prevented by
mandatory access control policies such as the Bell-
LaPadula (BL) model (Bell & LaPadula, 1976) but
handling of covert channel needs modifications in
conventional concurrency control schemes such as
two-phase locking (2PL) and timestamp ordering
(TO).
Most of the research efforts in the area of secure
concurrency control are focused on centralized
databases. Several approaches have been proposed
for centralized secure concurrency control in
MLS/DBMSs. Most of these are either extension of
the 2PL protocol or of timestamp-based protocols
(Atluri, Jajodia & Bertino, 1997). The performance
of secure concurrency control algorithms has also
been studied (Son & David, 1994 and Sohn &
Moon, 2000.). However, to the best of author’s
knowledge the performance study of MLS/DDBS
has not been yet reported.
The problem of covert channel makes secure
concurrency control algorithms more complex than
conventional concurrency control algorithms. In this
paper, we concern ourselves with concurrency
control algorithm that has to satisfy both security
and consistency requirements and compare the
performance of secure 2PL with non-secure 2PL for
secure distributed database via simulation.
The remainder of the paper is organized as
follows. The next section presents MLS distributed
database model. Section 3 presents the secure two-
phase locking concurrency control algorithm that
implemented in our simulation model. Section 4
gives the details of the simulation model. The results
of simulation experiments are discussed in Section
5. Section 6 concludes the paper.
2 MLS DISTRIBUTED DATABASE
MODEL
We use the MLS distributed database model given in
(Ray, Mancini, Jajodia & Bertino, 2000). It consists
of a set N of sites, where each site N є N is an MLS
database. Each site has an independent processor
connected via secure (trusted) communication links
to other sites. Thus no communication between two
sites is subject to eavesdropping, masquerading,
reply or integrity violations.
The MLS distributed database is modeled as a
quadruple < D, T, S, L >, where D is the set of data
items, T is the set of distributed transactions, S is the
partially ordered set of security levels with an
ordering relation ≤, and L is a mapping from D ∪ T
to S. Security level S
i
is said to dominate security
level S
j
if S
j
≤ S
i
. For every x є D, L(x) є S, and for
every T є T, L(T) є S. Every data object x, as well as
every distributed transaction T, has a security level
associated with it.
Each MLS database N is also mapped to an
ordered pair of security classes L
min
(N) and L
max
(N).
Where L
min
(N), L
max
(N) є S, and L
min
(N) ≤ L
max
(N).
In otherwords, every MLS database in the
distributed database has a range of security levels
associated with it. For every data item x stored in an
MLS database N, L
min
(N) ≤ L(x) ≤ L
max
(N) Similarly,
for every transaction T executed at N, L
min
(N) ≤ L(T)
≤ L
max
(N). A site N
i
is allowed to communicate with
another site N
j
only if L
max
(N)
i
= L
max
(N)
j.
The
security policy used is based on the Bell-LaPadula
model and enforces the following restrictions:
Simple Security Property: A transaction
T(subject) is allowed to read a data item(object) x
only if L(x) ≤ L (T).
Restricted *- Property: A transaction T is
allowed to write a data item x only if L (x) = L (T).
Thus, a transaction can read objects at its level or
below, but it can write objects only at its level. In
addition to these two requirements, a secure system
must guard against illegal information flows through
covert channels.
3 SECURE TWO PHASE
LOCKING PROTOCOL
Two-phase locking is the most widely used
concurrency control algorithm in database systems
for synchronizing accesses to shared data and has
been realized in most of the commercial systems
(
Bernstein, Hadzilacos, & Goodman, 1987 and Mohan,
Lindsay, & Obermarck, 1986).
As the name indicates,
two-phase locking (2PL) consists of two phases. The
first phase is called expanding phase during which
new locks can be acquired but none can be released.
The second phase is called shrinking phase during
which locks held by a transaction are released but no
new locks can be acquired. For strict execution,
strict two-phase locking additionally requires that all
locks held by a transaction be released only after the
transaction commits or aborts (
Ceri & Pelagatti, 1984).
If a transaction T
i
is holding a lock on shared data
item x, no other transaction T
j
can get access to x if
their operation on x conflict. As a result, the
isolation of transactions is enforced.
ICEIS 2005 - DATABASES AND INFORMATION SYSTEMS INTEGRATION
268