ABSTRACT
Due to the international Internet community, open, personalized features, made it
to the sharing of information resources and technology sharing with people at the same
time, insecurity has brought the hidden dangers which include covert channels.The
spatial database with high secutity level has become a very active research field in the
area of computer science.However, most of existing covert channel analysis
technologies work for the operation system and the network environment ,They can’t
apply to spatial database area directly.So reasearching the covert channel technologies
of spatial database have an important significance for the practical application of the
spatial database.
This thesis mainly works over the identification and elimination of covert channel,
Based on multilevel security spatial database,it chooses the more appropriate tool for
the identification,then eliminates the covert channels which have identifted.
This article mainly uses Covert Flow Tree Approach to identify covert channels in
database,then classifies the covert channels which have identifted,and then separately
designs and implements different covert channel elimination modules aiming at storage
covert channel and timing covert channel.For storage covert channel elimination
module ,it firstly expands the integrity rules in order to solve integrity security isssue
caused by the expansion of relational data model or data type,then introduces
polyinstantiation and expands SQL statement,thus these will eliminate storage covert
channel; For timing covert channel elimination module,the main study is covert channel
by concurrency control mechanism,and proposes a new optimistic concurrency control
algorithm in multilevel secutity spatial database,and then eliminates this sort of timing
covert channel. Sum up full paper finally and point out the direction being able to study
further.
By the fact theoretical analysis and practice study, the study of covert channel in
spatial database in this paper has provided certain train of thought and beneficial trial.
Key Word:covert channel, multilevl security spatial database, covert
flow tree approach, polyinstantiation, optimistic concurrency control
algorithm