13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Safe Serializable Secure Scheduling: Transactions and the Trade-off Between Security and Consistency

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and consistency with persistent data. However, the coordination mechanisms needed for transactions can both leak confidential information and allow unauthorized influence. By implementing a simple attack, we show these side channels can be exploited. However, our focus is on preventing such attacks. We explore secure scheduling of atomic, serializable transactions in a federated setting. While we prove that no protocol can guarantee security and liveness in all settings, we establish conditions for sets of transactions that can safely complete under secure scheduling. Based on these conditions, we introduce staged commit, a secure scheduling protocol for federated transactions. This protocol avoids insecure information channels by dividing transactions into distinct stages. We implement a compiler that statically checks code to ensure it meets our conditions, and a system that schedules these transactions using the staged commit protocol. Experiments on this implementation demonstrate that realistic federated transactions can be scheduled securely, atomically, and efficiently.

          Related collections

          Author and article information

          Journal
          2016-08-16
          2016-08-21
          Article
          1608.04841
          699bfb87-1e67-44a5-8009-9e21533fc2fc

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Technical Report
          cs.DC cs.CR

          Security & Cryptology,Networking & Internet architecture
          Security & Cryptology, Networking & Internet architecture

          Comments

          Comment on this article