透過您的圖書館登入
IP:3.147.85.201
  • 學位論文

在無線網路環境中對多級安全資料庫之排程控制

An Efficient Scheduler for Accessing Multi-Level Secure Databases in Wireless Environment

指導教授 : 陳志誠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


無線通訊的價格已大幅下降,然而使用率仍然偏低,其中主要原因之一是資訊安全的疑慮。由於越權存取的威脅日益嚴重,本研究即著重在無線環境中對資料庫存取的安全控制。此外,由於無線通訊具有周期性短、頻寬小、覆蓋率低及易斷線等特性,如果生硬的將有線環境之存取控制方式,套用到無線環境之中,必然會造成效能低落。 本研究將客戶端分成手機、個人數位助理、桌上型電腦及筆記型電腦這四級並賦予優先權的觀念,並與多級安全架構及優先權結合,使其存取控制的機制更有效率。使用SQL Query Analyzer來模擬兩階段鎖定及利他鎖定,並評估其效能,最後提出Priority/MLS/AL的架構希望對無線網路的資料庫存取控制能有所貢獻。本架構適用於無線環境的特性,不但能使享有優先權之用戶迅速獲得資料庫之回應,並且能保障資料之安全。

並列摘要


Though the cost of the wireless communication has dropped significantly, its utilization rate is low. One of the main reasons is the concern for security. Due to the increasing threat of unauthorized access, this research focuses on the access control to secure databases. It is especially applicable in the wireless environment, which is characterized by its short access life cycle, low bandwidth and frequent communication disruption. Efficiency is another important consideration in this research. Taking scheduling efficiency and data security into consideration, we proposed a Priority/MLS/AL framework for supporting transaction scheduling in wireless environment. In the framework we divide users into 3 priority levels and data objects into 4 security levels. Mobile stations used in the experiments are cellular phones, personal digital assistants, notebooks and personal computer. Altruistic locking are used as a mechanism for reserving data objects. A simulation of the system behavior is made. The result shows that the framework proposed will enchance scheduling performance and data security.

參考文獻


[Bernstein & Goodman 1980] P. Bernstein and N. Goodman, Fundamental Algorithms for Concurrency Control in Distributed Database Systems, CCA TR. Contract No. F30603-79-0191, Cambridge, MA, 1980.
[Beyer et al. 1998] K. S. Beyer, M. Livny and R. Ramakrishnan, Protecting the quality of service of existing information systems. Proceedings of the 3rd IFCIS International Conference on Cooperative Information Systems. New York, 1998.
[Denning 1987] D. Denning, Views for Multilevel Database Security, IEEE Trans on Software Engineering, vSE-13 n2, pp.129-140, Feb 1987.
[Ferraiolo et al. 1999] D. Ferraiolo, J. Barkley and R. Kuhn, A role-based access control model and reference implementation within a corporate intranet, ACM Transactions on Information and Systems Security, Vol.2, No.1, pp.34-64, 1999.
[Garofalakis & Ioannidis 1997] M. Garofalakis and Y. Ioannidis, Parallel query scheduling and optimization with time and space-shared resources. . Proceedings of the Conference on Very Large Data Bases (VLDB). Athens Greece, pp.296-305, 1997.

延伸閱讀