• Title/Summary/Keyword: 철회

Search Result 360, Processing Time 0.023 seconds

MOERS: An Eager Replication Scheme using Extended Messaging Order of Group Communication (MOERS: 그룹 통신의 메시징 순서를 확장한 즉시 갱신 중복 기법)

  • Mun, Ae-Gyeong;Nam, Gung-Han;Jo, Haeng-Rae
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.502-512
    • /
    • 2002
  • Most of previous replication schemes assume lazy schemes, which asynchronously propagate replica updates to other nodes after the updating transaction commits. While lazy schemes are novel in the sense that they can resolve high deadlock frequencies of eager schemes, they suffer from the fact that users should be responsible for the data consistency. Recently replication schemes based on the messaging order of group communication have been studied. They can reduce the deadlock frequencies using the messaging order, but they have another problem of increasing execution overhead of aborted transactions at high degree of concurrency. This is because the sender node validates global serializability after multicasting replica update messages to other nodes. In this paper, we propose an efficient eager replication scheme for reducing the number of messaging and overhead of aborted transactions significantly. The proposed scheme validates any conflicts before multicasting and does not multicast when there is any conflict; hence, it can exploit performance improvement by alleviating the message traffic for replica update or by reducing the number of disk accesses and locking delay due to aborted transactions.

Design and Implementation of a Reprocessing Transaction Model for Mobile Computing Environments (모바일 컴퓨팅 환경을 위한 재수행 트랜잭션 모델의 설계 및 구현)

  • 김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.184-196
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that can update independently local objects of mobile clients during disconnection. Validation based protocols that are well known to be appropriate for mobile transactions are required to abort a conflicted transaction in order to keep data consistent. Since abortion leads to cancel of all of tile updates, it is not desirable to use the abortion for resolving conflicts of mobile transactions. In this paper, we propose a reprocessing transaction model to resolve the update conflicts between mobile transactions without aborting them. We also design a mobile transaction server to support the reprocessing transaction and build a prototype of a mobile field system. The reprocessing transaction is a subtransaction of a newly committed mobile transaction and re-executes only conflicted objects with foreign conflicted objects. We also introduce a progressive reprocessing scheme to expose non-conflicted objects of the mobile transaction to other transactions in order to reduce starvation of reprocessing transactions.

MOERS : An Eager Replication Scheme using Extended Messaging Order of Group Communication (MOERS : 그룹 통신의 메시징 순서를 확장한 즉시 갱신 중복 기법)

  • Mun, Ae Gyeong;Nam, Gung Han;Jo, Haeng Rae
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.500-500
    • /
    • 2002
  • Most of previous replication schemes assume lazy schemes, which asynchronously propagate replica updates to other nodes after the updating transaction commits. While lazy schemes are novel in the sense that they can resolve high deadlock frequencies of eager schemes, they suffer from the fact that users should be responsible for the data consistency. Recently replication schemes based on the messaging order of group communication have been studied. They can reduce the deadlock frequencies using the messaging order, but they have another problem of increasing execution overhead of aborted transactions at high degree of concurrency. This is because the sender node validates global serializability after multicasting replica update messages to other nodes. In this paper, we propose an efficient eager replication scheme for reducing the number of messaging and overhead of aborted transactions significantly. The proposed scheme validates any conflicts before multicasting and does not multicast when there is any conflict; hence, it can exploit performance improvement by alleviating the message traffic for replica update or by reducing the number of disk accesses and locking delay due to aborted transactions.

Efficient Concurrency Control Method for Firm Real-time Transactions (펌 실시간 트랜잭션을 위한 효율적인 병행수행제어 기법)

  • Shin, Jae-Ryong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.115-121
    • /
    • 2010
  • It always must guarantee preceding process of the transaction with the higher priority in real-time database systems. The pessimistic concurrency control method resolves a conflict through aborting or blocking of a low priority transaction. However, if a high priority transaction is eliminated in a system because of its deadline missing, an unnecessary aborting or blocking of a low priority transaction is occurred. In this paper, the proposed method eliminates a transaction that is about to miss its deadline. And it prevents needless wastes of resources and eliminates unnecessary aborting or blocking of a low priority transaction. It is shown through the performance evaluation that the proposed method outperforms the existing methods in terms of the deadline missing ratio of transactions.

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

A Write Notification Approach for Optimistic Concurrency Control Schemes (낙관적 동시성 제어를 위한 쓰기 통지 기법)

  • SungChan Hong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.633-639
    • /
    • 2004
  • The performance of optimistic concurrency control schemes which are generally used for Mobile computing is very sensitive to the transaction abort rate. Even if the abort probability can be reduced by back-shifting the timestamp from the time of requesting a commit, some transactions continuously perform unnecessary operations after the transactions accessed write-write conflicting data. In this paper, we propose an optimistic protocol that can abort the transactions during the execution phase by using the write notification approach. The proposed protocol enhances the performance of the optimistic concurrency control by reducing the unnecessary operations. In addition, we present a simulation study that compares our schemes with the timestamp based certification scheme. This study shows that our scheme outperforms the timestamp based certification scheme.

  • PDF

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.