Enforcing Security in Replicated DRTDBS

  • Pratik Shrivastava et al.


Timeliness and temporal consistency are the two primary requirements of DRTDBS (Distributed
Real-Time Database System). Timeliness is express in the form of a deadline, and the scheduler
assigns the priority based on the timeline. There exist different non-deterministic factors in the
DRTDBS that make it challenging to meet the deadline timely. Distributed processing, limitation
of system memory, the existence of single version data item, and access latency are some of them.
The replication technique is incorporated into this system to extricate such issues. This technique
improves the timeliness but compromises in mutual consistency. Replication protocol is design to
simultaneously improves timeliness and mutual consistency between data replicas in the system.
Existing replication protocol neither prevents the occurrence of a covert channel nor prevents the
unauthorized access. Thus, embedding security in the replicated DRTDBS (RDRTDBS) becomes
an essential part of the research for the researchers. In the present paper, our main objective is to
prevent covert channels in between low clearance level and high clearance level real-time
transactions (RTTs) and to prevent the unauthorized access of messages propagating in the
network. Our proposed solution is incorporated in the system model (Shrivastava, P., Shanker, U.,
2018c) such that our solution work for inside and outside security in the homogeneous working
environment of RDRTDBS. We have implemented and tested our proposed solution using different
parameters. The experimental result shows that our proposed solution is beneficial for real-time
applications that demand security, timeliness, and mutual consistency.