Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space

被引:6
作者
Cao, Yan [1 ]
Huang, Zhiqiu [1 ]
Kan, Shuanglong [1 ]
Fan, Dajuan [2 ]
Yang, Yang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Jiangsu, Peoples R China
[2] Nanjing Inst Technol, Sch Comp Engn, Nanjing 211167, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
cyber-physical space; topology configuration; access control; model checking; bigraphs; CHECKING;
D O I
10.26599/TST.2018.9010116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects are ubiquitous in this space, thereby exerting tremendous pressure on its security model. This model must ensure that both cyber and physical objects are always handled securely in this dynamic environment. In this paper, we propose a systematic solution to be able to specify security policies of the cyber-physical space and ensure that security requirements hold in these policies. We first formulate a topology configuration model to capture the topology characteristics of the cyber and physical worlds. Then, based on this model, a Topology-Aware Cyber-Physical Access Control model (TA-CPAC) is proposed, which can ensure the security of the cyber and physical worlds at the same time by adjusting permission assignment dynamically. Then, the topology configuration and TA-CPAC models are formalized by bigraphs and Bigraph Reactive System (BRS), respectively, allowing us to use model checking to rationalize the consequences of the evolution of topological configurations on the satisfaction of security requirements. Finally, a case study on a building automation access control system is conducted to evaluate the effectiveness of the proposed approach.
引用
收藏
页码:497 / 519
页数:23
相关论文
共 30 条
  • [1] On Lions, Impala, and Bigraphs: Modelling Interactions in Physical/Virtual Spaces
    Benford, Steve
    Calder, Muffy
    Rodden, Tom
    Sevegnani, Michele
    [J]. ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2016, 23 (02)
  • [2] [曹彦 Cao Yan], 2018, [计算机研究与发展, Journal of Computer Research and Development], V55, P1809
  • [3] Modeling access control for cyber-physical systems using reputation
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Jia, Jie
    Wang, Xingwei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1088 - 1101
  • [4] Fadhel A. B., J SYST SOFT, DOI [10.1016/j.jss.2015.05, DOI 10.1016/J.JSS.2015.05]
  • [5] Foley S., 2014, 25 INT C TOOLS ART I
  • [6] Geepalla E., 2013, 14 INT C EM SEC TECH
  • [7] Security policy verification for multi-domains in cloud systems
    Gouglidis, Antonios
    Mavridis, Ioannis
    Hu, Vincent C.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 97 - 111
  • [8] A formal proximity model for RBAC systems
    Gupta, Aditi
    Kirkpatrick, Michael S.
    Bertino, Elisa
    [J]. COMPUTERS & SECURITY, 2014, 41 : 52 - 67
  • [9] Access Control Policy Verification
    Hu, Vincent C.
    Kuhn, Rick
    [J]. COMPUTER, 2016, 49 (12) : 80 - 83
  • [10] MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES
    Hu, Vincent C.
    Kuhn, D. Richard
    Xie, Tao
    Hwang, Jeehyun
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2011, 21 (01) : 103 - 127