Multilevel security requirements introduce a newA database scheduler is an integral part of a database dimension to traditional database schedulers as they cause covert system that is responsible for concurrency control functions. channels. To prevent covert channels, scheduler for multilevel The objective of concurrency control is to allow concurrent secure database should ensure that transactions at low security execution of transactions without violating the consistency of level are never delayed by high security level transactions in the the database [7]. Various schedulers for concurrency control event of a data conflict. This may subjected to an indefinite delay have been proposed [7,8,9,10]. Among them two phase if it is forced to abort repeatedly to high security level locking [7] is the one most commonly adopted in the design of transactions and making the secure scheduler unfair towards commercial products. However, conventional two-phase high security level transactions [12]. This paper proposes secure locking scheduler is not suitable for MLS/DDBMS, because database scheduler that is based on both optimistic and locking techniques (SO2PL) for multilevel secure distributed database they channel the uexpeed commniction path called systems. The proposed database scheduler is free from covert covert channel [2] between transactions having different channels without starving the high security level transactions. security levels that have shared access to data item in the Through a simulation study we evaluate the performance of the database. In order for an MLS/DDBMS to be correct, it has to So2PL and compare it with S2PL scheduler. satisfy two more requirements in addition to data consistency. One is the elimination of covert channels [2] and the other is Keywords-distributed database, scheduler,Multilevel DDBMS, the prevention of the starvations of high security level Secure optimistic two phase locking transactions.Several schedulers for centralized MLS/DBMS that are free I. INTRODUCTION from covert channels have been proposed in the literature [3,13]. Most of these schedulers prevent covert channels byIn many applications such as military, government providing a higher priority to low transaction whenever a data agencies, hospitals, multiple users share the same database, and conflict occurs between a high and a low security transaction. some of the users can have restricted access (read/write) to A secure locking based scheduler called S2PL modified the information from the database. Many ofthese applications are 2PL scheduler to covert channel free scheduler. In this inherently distributed in nature. Hence, it is necessary to scheduler, when a low security level transaction requests for a provide security for distributed databases. One common lock on a data item that is currently held by a high security technique for supporting the security can be a multilevel level transaction, the high security level transaction is aborted security (MLS).The basic model of MLS was introduced by to release the loc...