Non-interference assessment in colored net systems via integer linear programming

被引:0
作者
Zhong, Wenjing [1 ,2 ]
Zhao, Jinjing [2 ]
Hu, Hesuan [1 ,3 ,4 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
[2] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[3] Nanyang Technol Univ, Coll Engn, Sch Comp Sci & Engn, Singapore 639798, Singapore
[4] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710049, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Information leak; Non-interference; Colored net systems (CNSs); Integer linear programming; DISCRETE-EVENT SYSTEMS; PETRI NETS; OPACITY;
D O I
10.1016/j.ins.2023.120027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Event-related information leaks are a potential security hazard in information systems. Non-interference is a security property to describe event-related information security. Non-interference assessment is to detect whether a public observer can infer the occurrences of private events from the observation of public ones. To assess the non-interference of information systems, the utilization of formal modeling tools, especially Petri nets (PNs), is an effective way used in most previous works. However, for large-scale systems, non-interference assessment leads to the problem of state explosion in the context of basic net systems (NSs) defined by PNs. In this paper, considering the structural similarity of large-scale systems, colored PNs are used to model them more compactly and efficiently. We focus on the assessment of two typical non-interference properties, i.e., strong nondeterministic non-interference (SNNI) and bisimulation SNNI (BSNNI), in colored NSs (CNSs). Specifically, we propose a non-interference assessment method for bounded CNSs based on the definitions of SNNI and BSNNI in the context of CNSs. This method involves coarse and fine assessments. A coarse assessment is achieved via integer linear programming (ILP) by leveraging the structural similarity of systems. In contrast, the fine assessment can be fulfilled using ILP-based analysis or firing way analysis based on the results obtained by the coarse assessment, which is not essentially necessary. In particular, a fine assessment is necessary only if a coarse assessment is failed to obtain accurate assessment results. Finally, efficiency analysis reveals that our method reduces assessment redundancy and improves assessment efficiency.
引用
收藏
页数:18
相关论文
共 37 条
[1]  
Accorsi R., 2011, P 2011 ACM S APPL CO, P308
[2]   Information leak detection in business process models: Theory, application, and tool support [J].
Accorsi, Rafael ;
Lehmann, Andreas ;
Lohmann, Niels .
INFORMATION SYSTEMS, 2015, 47 :244-257
[3]  
Baldan Paolo, 2015, Formal Aspects of Component Software - 11th International Symposium, FACS 2014. Revised Selected Papers: LNCS 8997, P269, DOI 10.1007/978-3-319-15317-9_17
[4]   A Causal View on Non-Interference [J].
Baldan, Paolo ;
Carraro, Alberto .
FUNDAMENTA INFORMATICAE, 2015, 140 (01) :1-38
[5]  
Basile E, 2018, P AMER CONTR CONF, P3056, DOI 10.23919/ACC.2018.8431241
[6]   On K-diagnosability of Petri nets via integer linear programming [J].
Basile, F. ;
Chiacchio, P. ;
De Tommasi, G. .
AUTOMATICA, 2012, 48 (09) :2047-2058
[7]   Assessment of Bisimulation Non-Interference in Discrete Event Systems Modelled With Bounded Petri Nets [J].
Basile, Francesco ;
De Tommasi, Gianmaria .
IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (04) :1151-1156
[8]  
Basile F, 2018, IEEE INT C EMERG, P441, DOI 10.1109/ETFA.2018.8502532
[9]   Characterizing intransitive noninterference for 3-domain security policies with observability [J].
Ben Hadj-Alouane, N ;
Lafrance, S ;
Lin, F ;
Mullins, J ;
Yeddes, M .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2005, 50 (06) :920-925
[10]   On the verification of intransitive noninterference in mulitlevel security [J].
Ben Hadj-Alouane, N ;
Lafrance, S ;
Lin, F ;
Mullins, J ;
Yeddes, MM .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2005, 35 (05) :948-958