Design and analysis of a secure two-phase locking protocol
نویسندگان
چکیده
In addition to maintaining consistency of the database, secure concurrency control algorithms must be free from covert channels arising due to data conflicts between transactions. The existing secure concurrency control approaches are unfair to transactions at higher access classes. In this paper, a secure two-phase locking protocol is presented, which is correct and free from covert channels. The protocol uses three diferent types of locks to support non-intelference property and to provide reasonably fair execution of all transactions, regardless of their access class. The results of a pelformance evaluation of the protocol are provided, comparing it with secure optimistic concurrency control and secure multiversion timestamp ordering.
منابع مشابه
The Transient Behavior of LC and Ring Oscillators under External Frequency Injection
In this work, time domain analysis is used to solve Adler’s equation in order to obtain the required time, for an oscillator under external injection, reaching the steady-state condition. Mathematical approach has been applied to fully describe the transient of frequency acquisition in injection-locked LC and Ring oscillators considering their time-varying nature. Then, the analysis is verifie...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملSecure Network using Secure Hash Algorithm-3 with Locking Protocol in Distributed Database System
The two phase locking protocol provides controlled access to a data item and prevents data inconsistencies in the distributed database system. The hashing algorithm is used to calculate hash value for the requested data item and the generated hash value is used as a medium to secure the communication between server and client connected through a network. This paper presents a methodology which ...
متن کاملEvaluation of Phase Locking and Cross Correlation Methods for Estimating the Time Lag between Brain Sites: A Simulation Approach
Introduction: Direction and latency of electrical connectivity between different sites of brain explains brain neural functionality. We compared efficiency of cross correlation and phase locking methods in time lag estimation which are based on local field potential (LFP) and LFPspike signals, respectively. Methods: Signals recorded from MT area of a macaque’s brain was used in a simulation ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل