一种新的安全2PL实时并发控制算法(ES2PL)

Ebrahim Abduljalil , Fursan Thabit , Ozgu Can , Pritam R. Patil , S.B. Thorat
{"title":"一种新的安全2PL实时并发控制算法(ES2PL)","authors":"Ebrahim Abduljalil ,&nbsp;Fursan Thabit ,&nbsp;Ozgu Can ,&nbsp;Pritam R. Patil ,&nbsp;S.B. Thorat","doi":"10.1016/j.ijin.2022.05.001","DOIUrl":null,"url":null,"abstract":"<div><p>A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurrency control algorithm is the two-phase locking with high priority (2 PL-HP). The inclusion of cyclic restart, deadlock, unnecessary abort, pseudo-priority inversion, and starvation, on the other hand, may reduce its performance. In this paper, a new enhanced of secure two-phase locking protocol with multilevel secure distributed database systems is presented, the idea of enhanced secure Two-Phase locking protocol by adding the security level to assign the priority to the transaction. The enhanced add a secure manager to decide the level of the security and give the instruction to process the transaction in real lock with data x/virtual lock with version data x0 or decided to Abort the transaction based on the security level. The suggested study intends to reduce transaction miss rate by addressing the following issues: deadlock by splitting the execution stage into locking and processing phases, it reduces unnecessary cycle restart, transaction aborts by checking the security priority level (high, medium, low), and generating virtual lock and versions data. Finally, simulation performance confirms that improvement in transactions miss's percent and reduction in transactions' rollbacks compared to other secure concurrency control.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 48-57"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000057/pdfft?md5=d2e2e645ad1d978c06bc941ecae293c4&pid=1-s2.0-S2666603022000057-main.pdf","citationCount":"1","resultStr":"{\"title\":\"A new secure 2PL real-time concurrency control algorithm (ES2PL)\",\"authors\":\"Ebrahim Abduljalil ,&nbsp;Fursan Thabit ,&nbsp;Ozgu Can ,&nbsp;Pritam R. Patil ,&nbsp;S.B. Thorat\",\"doi\":\"10.1016/j.ijin.2022.05.001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurrency control algorithm is the two-phase locking with high priority (2 PL-HP). The inclusion of cyclic restart, deadlock, unnecessary abort, pseudo-priority inversion, and starvation, on the other hand, may reduce its performance. In this paper, a new enhanced of secure two-phase locking protocol with multilevel secure distributed database systems is presented, the idea of enhanced secure Two-Phase locking protocol by adding the security level to assign the priority to the transaction. The enhanced add a secure manager to decide the level of the security and give the instruction to process the transaction in real lock with data x/virtual lock with version data x0 or decided to Abort the transaction based on the security level. The suggested study intends to reduce transaction miss rate by addressing the following issues: deadlock by splitting the execution stage into locking and processing phases, it reduces unnecessary cycle restart, transaction aborts by checking the security priority level (high, medium, low), and generating virtual lock and versions data. Finally, simulation performance confirms that improvement in transactions miss's percent and reduction in transactions' rollbacks compared to other secure concurrency control.</p></div>\",\"PeriodicalId\":100702,\"journal\":{\"name\":\"International Journal of Intelligent Networks\",\"volume\":\"3 \",\"pages\":\"Pages 48-57\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666603022000057/pdfft?md5=d2e2e645ad1d978c06bc941ecae293c4&pid=1-s2.0-S2666603022000057-main.pdf\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Intelligent Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666603022000057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Networks","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666603022000057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

除了确保数据库完整性外,安全的并发控制算法还必须没有源自事务之间数据冲突的隐蔽通道。当前的安全并发控制算法对具有更高访问类的事务不正确。因为它更好地解决了优先级反转问题。一种广泛使用的并发控制算法是高优先级的两阶段锁(2 PL-HP)。另一方面,包含循环重启、死锁、不必要的中止、伪优先级反转和饥饿可能会降低其性能。本文提出了一种基于多级安全分布式数据库系统的增强安全两阶段锁定协议,即通过增加安全级别来为事务分配优先级的增强安全两阶段锁定协议的思想。增强后增加了一个安全管理器来决定安全级别,并根据安全级别指示在数据为x的实锁/数据为x0的虚锁中处理事务,或者决定终止事务。建议的研究旨在通过解决以下问题来降低事务失误率:通过将执行阶段划分为锁定和处理阶段来减少死锁,通过检查安全优先级级别(高、中、低)来减少不必要的周期重启,通过生成虚拟锁和版本数据来减少事务中断。最后,模拟性能证实,与其他安全并发控制相比,事务丢失百分比的改进和事务回滚的减少。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A new secure 2PL real-time concurrency control algorithm (ES2PL)

A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurrency control algorithm is the two-phase locking with high priority (2 PL-HP). The inclusion of cyclic restart, deadlock, unnecessary abort, pseudo-priority inversion, and starvation, on the other hand, may reduce its performance. In this paper, a new enhanced of secure two-phase locking protocol with multilevel secure distributed database systems is presented, the idea of enhanced secure Two-Phase locking protocol by adding the security level to assign the priority to the transaction. The enhanced add a secure manager to decide the level of the security and give the instruction to process the transaction in real lock with data x/virtual lock with version data x0 or decided to Abort the transaction based on the security level. The suggested study intends to reduce transaction miss rate by addressing the following issues: deadlock by splitting the execution stage into locking and processing phases, it reduces unnecessary cycle restart, transaction aborts by checking the security priority level (high, medium, low), and generating virtual lock and versions data. Finally, simulation performance confirms that improvement in transactions miss's percent and reduction in transactions' rollbacks compared to other secure concurrency control.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
12.00
自引率
0.00%
发文量
0
期刊最新文献
Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends Machine Learning-enhanced loT and Wireless Sensor Networks for predictive analysis and maintenance in wind turbine systems Research on secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm A method of vehicle networking environment information sharing based on distributed fountain code Introducing a high-throughput energy-efficient anti-collision (HT-EEAC) protocol for RFID systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1