Cornell University
Library
Cornell UniversityLibrary

eCommons

Help
Log In(current)
  1. Home
  2. Cornell Computing and Information Science
  3. Computing and Information Science
  4. Computing and Information Science Technical Reports
  5. Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency (Technical Report)

Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency (Technical Report)

File(s)
tr.pdf (4.3 MB)
PDF version of the report
Permanent Link(s)
https://hdl.handle.net/1813/44581
Collections
Computing and Information Science Technical Reports
Author
Sheff, Isaac
Magrino, Tom
Liu, Jed
Myers, Andrew C.
van Renesse, Robbert
Abstract

Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and consistency with persistent data. However, the coordination mechanisms needed for transactions can both leak confidential information and allow unauthorized influence.

By implementing a simple attack, we show these side channels can be exploited. However, our focus is on preventing such attacks. We explore secure scheduling of atomic, serializable transactions in a federated setting. While we prove that no protocol can guarantee security and liveness in all settings, we establish conditions for sets of transactions that can safely complete under secure scheduling. Based on these conditions, we introduce staged commit, a secure scheduling protocol for federated transactions. This protocol avoids insecure information channels by dividing transactions into distinct stages. We implement a compiler that statically checks code to ensure it meets our conditions, and a system that schedules these transactions using the staged commit protocol. Experiments on this implementation demonstrate that realistic federated transactions can be scheduled securely, atomically, and efficiently.

Sponsorship
This work was supported by MURI grant FA9550-12-1-0400,
by NSF grants 1513797, 1422544, 1601879, by gifts from Infosys and
Google, and by the Department of Defense (DoD) through the
National Defense Science & Engineering Graduate Fellowship (NDSEG)
Program.
Date Issued
2016-08-16
Keywords
security
•
transactions
•
information flow
•
distributed systems
Related Version
This is a technical report associated with a paper of the same name appearing in the Proceedings of the 2016 ACM Conference on Computing and Communication Security.
Rights
Attribution-NonCommercial-NoDerivatives 4.0 International
Rights URI
https://creativecommons.org/licenses/by-nc-nd/4.0/
Type
article

Site Statistics | Help

About eCommons | Policies | Terms of use | Contact Us

copyright © 2002-2026 Cornell University Library | Privacy | Web Accessibility Assistance