Title: Timeliness and Security in Real-Time Data Services
1Timeliness and Security in Real-Time Data
Services
- Sang Hyuk Son
- Department of Computer Science
- University of Virginia
- Charlottesville, Virginia 22903
- son_at_cs.virginia.edu
2Outline
- Introduction to real-time systems
- Trends in real-time system applications
- Key research issues
- Real-time and secure data services
- QoS management
- Flexible security
- Summary
3Real-Time Systems
- A system whose basic specification and design
correctness arguments must include its ability to
meet its timing constraints. - Its correctness depends not only on the logical
correctness, but also on the timeliness of its
actions.
4Input
Real-Time System
Real World
Output
- Input
- current state (view) update
- tasks to be performed by real-time systems
- Output
- actions to change real world situation
- information to be retrieved to support
decision-making
5Real-Time Systems
- Real-time systems
- timeliness and predictability
- typically embedded in a large complex system
- dependability (reliability) is crucial
- explicit timing constraints (soft, firm, hard)
- A large number of applications
- aerospace and defense systems, nuclear systems,
robotics, process control, agile manufacturing,
stock exchange, network and traffic management,
multimedia computing, and medical systems - Rapid growth in research and development
- workshops, symposia, journals
- standards (POSIX, RT-SQL, RT-CORBA, RT-Java, etc)
6Time Constraints
v(t)
v0
d
t
v(t)
v0
d2
t
d1
7Trends in Real-Time Systems Applications
- Soft real-time requirements rather than hard ones
- much wider applications
- relates well with the notion of QoS
- soft is harder to deal with than hard ones
- Operate in unpredictable environments
- WCET too pessimistic or high variance in
execution time - unbounded arrival rate overload unavoidable
- Need to support multi-dimensional requirements
- real-time, power, size, cost, security, and
fault-tolerance - conflicting resource requirements and system
architecture - Embedded and component-based
8Example Application
arrival rate? resource requirement?
delay? congested?
Resources?
Service delay? Throughput? Differentiation?
User population? Processing power?
- Performance-critical applications in
unpredictable environments - open systems on the Internet e-business servers,
web hosting - data-driven systems real-time databases, smart
spaces
9Sensor Networks Swarm Computing
Resource management, team formation, real-time,
mobility, power, security
Smart Dust
Heterogeneous Sensors/Actuators/processors
- battlefield awareness
- earthquake response
- tracking movements of animals
- smart paint
- MEMS in human bloodstream
10Smart Spaces
- Pervasive
- Global connectivity
Smart School
Smart Classroom
Smart City
Smart Factory
11Key Research Issues
- How to support aggregated properties (control
them) - theory and practice of feedback control
- middleware architecture for large-scale
distributed systems - How to manage real-time data
- timeliness and data freshness
- flexible security
- How to support multidimensional requirements
- system composition via components
- reflection-based approaches
12Data Services for Real-Time Systems
- Critical in real-time systems
- real-time computing needs to access data
- real-world applications involve time constrained
access to data that may have temporal property - traditional real-time systems manage data in
application-dependent structures - as systems evolve, more complex applications
require efficient access to more data - Function of real-time data services
- gathering data from the environment, processing
it in the context of information acquired in the
past, for providing timely and temporally
consistent responses
13Real-Time Data Services Examples
- They are used to monitor and control real-world
activities - Networking and telecommunication systems
- routers and network management systems
- switching systems
- Control systems
- automatic tracking and object positioning
- Real-time streaming from sensors and video
servers - E-commerce
- Web-based data services
14Something to Remember ...
- Real-time ? FAST
- Real-time ? nonosecs or ?secs
- Real-time means explicit or implicit time
constraints - A high-performance database which is simply fast
without the capability of specifying and
enforcing time constraints are not appropriate
for real-time applications
15Time Constraints on Data
- Where do they come from?
- state of the world as perceived by the
controlling system must be consistent with the
actual state - Requirements
- timely monitoring of the environment
- timely processing of sensed information
- timely derivation of needed data
- Temporal consistency of data
- absolute consistency freshness of data between
actual state and its representation - relative consistency correlation among data
accessed by a transaction
16Static Data and Temporal Data
- Static data
- data in a typical database
- values not becoming obsolete as time passes
- logical consistency is the key consideration
- Temporal data
- arrive from continuously changing environment
- represent the state at the time of sensing
- has observed time and validity interval
- users of temporal data need to see temporally
coherent views of the data (state of the world) - When must the data be temporally valid?
- ideally, at all times
- in practice, only when they are used by
transactions
17An Example
- Data object is specified by
- (value, absolute validity interval, time-stamp)
- Interested in temperature and pressure
- with relative validity interval of 5
- Let current time 100
- temperature (347, 10, 95) and pressure (50,
20, 98) - -- temporally consistent
- temperature (347, 10, 98) and pressure (50,
20, 91) - -- temporally inconsistent
18BeeHive Project
- Global real-time database system
- object-based with added object semantics
- support in RT, FT, QoS, and Security
- different types of data video, audio, images and
text - sensors and actuators
- Novel component technology
- data deadline, forced delay, conditional priority
inheritance - real-time logging and recovery
- flexible security
- QoS management based on feedback control
- Cogency Monitor
19Current Research Activities in BeeHive
BeeHive Front End Java
Simulation
Cogency Monitor
Basic BeeHive Storage Manager
Expand DB
Database
Security
RTDB Internals
Admission Control
QoS Control
20QoS Management in RT Data Services
- Motivation
- increasing demands for real-time data services
- web-based information services
- sensor networks
- decision support systems
- temporary overload and service degradation
inevitable - Service quality QoS parameters
- timeliness
- data freshness
- behavior in transient state
21Objectives and Approaches
- Soft guarantees for timeliness and data freshness
- Approaches
- feedback control
- controller design and parameter tuning
- admission control
- adaptive update policy
- conflict between timeliness freshness
- dynamic balancing between updates and
transactions - differentiated services
- absolute/relative miss ratios
22Performance Metrics
- Transaction types
- sensor updates
- periodic updates to reflect the current status
- application transactions
- Major performance metrics
- data freshness
- deadline miss ratio
- behavior in transient state overshoot and
settling time
23RTDB Services
Update Streams
S1
S2
Sn
Deadline Freshness
Base(Sensor) Data Set
Adm Ctrl
User Transactions
Derived Data Set
Static Data Set
qRTDB
Scheduling/CC
24 Data Freshness
Database
Database Freshness Set of continuous data
Perceived Freshness Set of continuous data
accessed by timely transactions
25Timeliness Specification
Miss ratio
Overshoot
Steady state error
??
Reference
Steady State
Transient State
Time
Settling time
26QMF Architecture
27Feedback Control Architecture
Completed Transactions
EDF Scheduler
RTDB
MR(t)
FR(t)
QoS Manager (Actuator)
?U
PID Controller
Updates
MRs
Accepted Transactions
?U
FRs
Admission Controller
FCS
Submitted Transactions
Updates
28Real-Time Secure Data Management
- Characteristics
- transactions with timing constraints
- data with temporal properties
- distributed multimedia data
- mixture of sensitive and unclassified data
- Requirements
- timeliness and predictability
- temporal consistency
- synchronization of multimedia data
- security enforcement
- high performance
29Real-Time Secure Data Management
- Issues
- integrate support of different types of
requirements - predictability yet flexible execution
- conflicts between real-time and security
- storage, retrieval, and synchronization of
distributed data - real-time management resources
- high performance yet fault-tolerant
- trade-offs
- scalability of solutions
30Security and Real-Time
- For timeliness, no priority inversion in
real-time applications - tasks with earlier deadline or higher criticality
has higher priority for better service - In secure systems, no security violation is
allowed - Incompatible under the binary notion of absolute
security - priority inversion vs security violation
- Higher security services require more resources
31Example of the Problem
T1
T2
- high priority
- low priority
Access
Access
- high security
- low security
Resource
- Both require lock on the resource
- How to resolve this conflict?
- if lock is given to T1, security violation
- if lock is given to T2, priority inversion
32Requirement for Real-Time Secure DBS
- Supporting both requirements of real-time and
security for real-time databases -
- How to provide acceptably high security
while remains available and provides timely
services?
33Research Issues
- Flexible security vs absolute security
- paradigm for flexible security services
- identifying correct metrics for security level
- Adaptive security policies
- Mechanisms to enforce required level of security
and trading-off with other requirements - access control, authentication, encryption, ..
- time-cognizant protocols, data deadlines, ...
- replication, primary-backup, ...
- Specification to express desired system behavior
- verification of consistency/completeness of
specification
34Flexible Security Services
- Flexible vs absolute (binary) security
- traditional notion of security is binary secure
or not - problem of binary notion of security difficult
to provide acceptable level of security to
satisfy other conflicting requirements - research issue quantitative flexible security
levels - One approach
- represent in terms of of potential security
violations - problem not precise --- percentage alone reveals
nothing about implications on system security - e.g., 1violation may leak most sensitive data
out
35Flexible Security for Access Control
- Possible approaches to provide flexible security
- control potential violations between certain
security levels - even if it allows potential security violations,
it does not completely compromise the security of
the system - use different algorithms in an adaptive manner
- A possible configuration
Top secret
Top secret
Top secret
Top secret
Secret
Secret
Secret
Secret
Confidential
Confidential
Confidential
Confidential
Unclassified
Unclassified
Unclassified
Unclassified
B
C
D
A
36Flexible Security Policies (5 levels)
- Completely secure no violations allowed
- Secure levels 2, 3 4 high 3 levels kept
completely secure - Secure levels 3 4 high 2 levels kept
completely secure - Split security violations allowed between top 2
levels, and among low 3 levels - Secure level 4 highest level kept completely
secure - No security violations can occur between any
levels - Gradual security control the number of violation
between each level
37Performance Study
- Significant improvement in real-time performance
as more potential covert channels allowed - completely secure (6.5) vs no security (3.3)
for 500 data items - complete secure (5) vs no security (1) for 1000
data items - Trade-off capacities of security policies are
strictly ordered - from completely secure through multiple secure
levels to no security
38Simulation Results
39Flexible Security in BeeHive System
- Four available security levels on users/objects
or communications - computation costs increase with level of
security - Client negotiated range of security levels for
transaction communications - Dynamic level changes as a function of real-time
load
40Security Manager Services
- Multi-level authentication and confidentiality
encryption - Client authorization and session control
- Session key generation and management
- Transaction management
- Dynamic security level control for transaction
communications and synchronization
41Security Manager Environment
Client Table
Session Table
client security level key
session keys status
Mapper/ Admission Control
transaction handoff
session transaction requests
Security Manager
Scheduler
transaction object session data
TransData
transaction results
thread n
object read write
thread n-1
Beehive
42Impact of Difference in Message Size
43Adaptive vs. Non-Adaptive
44Level Switching (100 adaptive client)
MADE
LEVEL
3
2
LEVEL
1
0
45Discussions
- Good performance gains achievable in soft
real-time system during overload conditions - Reasonable performance with small message sizes
with I/O overhead - Flexibility using adaptive security policies is
effective and useful in practical systems
46Improved Security using RT Semantics
- Exploiting real-time properties for improved
security - timely detection of security violation is
essential - critical in real-time secure applications
- Example Intrusion detection using time signature
- temporal data need to be refreshed/updated
periodically - refresh rate can be chosen between some min and
max rate - typically a single rate is chosen and fixed,
while new rate within the min-max window can be
reassigned after some interval for improved
security - time semantics should be unknown to intruder
47Intrusion Detection using RT Semantics
- Idea of embedding security rules into data
objects - Rules are used to specify constraints
- define correct states of data objects and
inter-object relationships - actions to be taken on certain events
- violation of security constraints can be detected
(ECA rule) - update request on a sensitive temporal data
object (event) - triggers a rule to check right update time using
periodic update rate (condition) - reports suspicious update request (action)
48Normal and Suspicious Activities
- Establishing normal behavior is necessary to
detect intrusion - Ability to distinguish normal from suspicious
depends on the range of fluctuations of normal
behavior - Key parameter is acceptable tolerance in
deviation from normal - false alarms (false positives) increases with low
tolerance - missed detection (false negatives) increases with
high tolerance - Issue identify time semantics that are
effective even with varying system workload (and
which ones are not effective) - certain artificial time semantics can be
associated with sensitive data for intrusion
detection purpose (e.g., both time and duration
of access)
49Reflection Methodology
- Identify the reflective information (semantics)
- Retain the information to be accessible for
analysis - Perform security checks and analysis
- Retain the information at runtime (flexibility)
- Expose the information to the security management
code
50Reflection - Example
PCB - not reflective
PCB Reflective
registers
registers
ptr to stack
ptr to stack
priority
priority
deadline
What it takes to execute!
security info
time semantics
51Reflection in Real-Time Systems
- Enhances visibility of information between levels
(off-line to on-line) - semantic information (real-time, FT, security ..)
- individual module and system-wide policies
Simple Examples
1
1
vs
FT 3 exec.
2
2
3
3
Node 1 Node 2 Node 3
T1 P1 T2 P2 T3 P3
System does not know they are related
Lost information
52Data Services in Sensor Networks
- Recent advances in low-cost low-power devices
- large scale sensor networks (ad hoc mobile
networks) - each node consists of sensors/actuators/processors
- Key issues in data services
- how to collect and disseminate real-time data
- QoS management under resource constraints
- how to conserve energy while satisfying
application requirements - real-time constraints and security requirements
53Summary
- Most current real-time systems technology is
based on - predictable operating environments, known
workload, WCET, wired networks, highly reliable
nodes, no other conflicting requirements (e.g.,
power, security, FT, ..) - Trends
- soft RT, unpredictable environments,
multidimensional requirements, QoS, security,
embedded and wireless, simple and unreliable
nodes, aggregate behavior control, power
management, ... - New set of solutions needed
- QoS in real-time data services
- real-time secure data services reflective
approach - data services in sensor networks
54Recent Papers
- V. Lee, K. Lam, S. H. Son, and E. Chan,
- "On the Transaction Processing with Partial
Validation and Timestamps Ordering in Mobile
Broadcast Environments," - IEEE Transactions on Computers, vol. 51,
no. 10, Oct. 2002. - C. Park, S. Park, and S. H. Son, "Multi-version
Locking Protocol with Freezing for Secure
Real-Time Database Systems," IEEE Transactions
on Knowledge and Data Engineering, vol. 14, no.
5, pp 1141-1154, Sept/Oct 2002. - A. Datta and S. H. Son,
- "A Study of Concurrency Control in
Real-Time Active Database Systems," IEEE
Transactions on Knowledge and Data Engineering,
vol. 14, no. 3, pp 465-484, June 2002. - S. H. Son, R. Mukkamala, and R. David,
"Integrating Security and Real-Time Requirements
using Covert Channel Capacity," IEEE
Transactions on Knowledge and Data Engineering,
vol. 12, no. 6, pp 865-879, Dec. 2000.
55Recent Papers (contd)
- Lee, V., Stankovic, J, and Son, S.H., Intrusion
Detection in Real-Time Databases using Time
Signatures, IEEE Real-Time Technology and
Applications Symposium, Washington, DC, June
2000. - Son, S.H., Zimmermann, R., and Hansson, J., An
Adaptable Security Manager for Real-Time
Transactions, Euromicro Conference on Real-Time
Systems, Stockholm, Sweden, June 2000. - A. Datta, S. H. Son, and V. Kumar, "Is a Bird in
Hand Worth More than Two in the Bush?
 Limitations of Priority Cognizance in Conflict
Resolution for Firm Real Time Database Systems," - IEEE Transactions on Computers, vol. 49,
no. 5, pp 482-502, May 2000. - S. H. Son, "Issues and Approaches to Supporting
Timeliness and Security in Real-Time Database
Systems," Journal of Systems Architecture, vol,
46, no. 4, pp 397-410, Feb. 2000. - Son, S.H. Chaney, C, and Thomlinson, N., Partial
Security Policies to Support Timeliness in Secure
Real-Time Databases, IEEE Symposium on Security
and Privacy, Oakland, California, May 1998.
56Recent Papers (contd)
- J. Stankovic, S. H. Son, and J. Hansson,
Misconceptions About Real-Time Databases, IEEE
Computer, June 1999. - J. Stankovic and S. H. Son, An Architecture and
Object Model for Distributed Object-Oriented
Real-Time Databases, Journal on Computer Systems
Science and Engineering, 14(4), July 1999. - J. Stankovic, S. H. Son, and C. Nguyen, The
Cogency Monitor An External Interafce
Architecture for a Distributed Object-Oriented
Real-Time Database System, IEEE Real-Time
Technology and Applications Symposium, Denver,
Colorado, June 1998. - S. H. Son, R. David, and C. Chaney, "Design and
Analysis of an Adaptive Policy for Secure
Real-Time Locking Protocol," Journal of
Information Sciences, vol. 99, no. 1-2, pp
101-135, June 1997. - K. Kang, S. H. Son, and J. Stankovic, "STAR
Secure Real-Time Transaction Processing with
Timeliness Guarantees," 23rd IEEE Real-Time
Systems Symposium (RTSS'02), Austin, TX, Dec.
2002.
57A Proof
- Wondering why not many PhDs among the rich?
- 1. Knowledge is Power Knowledge Power
- 2. Time is Money Time Money
- 3. Power is the rate at which work is done
- Power Work / Time
- 4. Substituting Knowledge Money for Power
Time - Knowledge Work / Money
- 5. Solving for Money Money Work / Knowledge
- Money approaches infinity as Knowledge approaches
zero, regardless of the Work done. - Proven The less you know, the more you make.
- Quod Erat Demonstrandum