Supervisory Control for Opacity

被引:142
作者
Dubreil, Jeremy [1 ]
Darondeau, Philippe [1 ]
Marchand, Herve [1 ]
机构
[1] INRIA, Ctr Rennes Bretagne Atlantique, Rennes, France
关键词
Confidentiality; control; discrete event systems (DES); opacity; partial observation; security;
D O I
10.1109/TAC.2010.2042008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of computer security, a problem that received little attention so far is the enforcement of confidentiality properties by supervisory control. Given a critical system G that may leak confidential information, the problem consists in designing a controller C, possibly disabling occurrences of a fixed subset of events of G, so that the closed-loop system G/C does not leak confidential information. We consider this problem in the case where is a finite transition system with set of events Sigma and an inquisitive user, called the adversary, observes a subset Sigma(a) of Sigma. The confidential information is the fact (when it is true) that the trace of the execution of G on Sigma* belongs to a regular set S subset of Sigma*, called the secret. The secret S is said to be opaque w.r.t. G (respectively, G/C) and Sigma(a) if the adversary cannot safely infer this fact from the trace of the execution of G (respectively, G/C) on Sigma(a)*. In the converse case, the secret can be disclosed. We present an effective algorithm for computing the most permissive controller C such that S is opaque w.r.t. G/C and Sigma(a). This algorithm subsumes two earlier algorithms working under the strong assumption that the alphabet Sigma(a) of the adversary and the set of events that the controller can disable are comparable.
引用
收藏
页码:1089 / 1100
页数:12
相关论文
共 26 条
  • [1] Alur R, 2006, LECT NOTES COMPUT SC, V4052, P107
  • [2] Concurrent secrets
    Badouel, E.
    Bednarczyk, M.
    Borzyszkowski, A.
    Caillaud, B.
    Darondeau, P.
    [J]. DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2007, 17 (04): : 425 - 446
  • [3] On the verification of intransitive noninterference in mulitlevel security
    Ben Hadj-Alouane, N
    Lafrance, S
    Lin, F
    Mullins, J
    Yeddes, MM
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2005, 35 (05): : 948 - 958
  • [4] Bishop M., 2004, Introduction to computer security
  • [5] Blanchet B, 2005, IEEE S LOG, P331
  • [6] Opacity generalised to transition systems
    Bryans, Jeremy W.
    Koutny, Maciej
    Mazare, Laurent
    Ryan, Peter Y. A.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (06) : 421 - 435
  • [7] Cassandras C. G., 2009, INTRO DISCRETE EVENT, DOI DOI 10.1007/978-3-030-72274-6
  • [8] Synthesis of non-interferent distributed systems
    Cassez, Franck
    Mullins, John
    Roux, Olivier H.
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 159 - +
  • [9] Darmaillacq V, 2006, LECT NOTES COMPUT SC, V3964, P341
  • [10] DUBREIL J, 2009, P EUR CONTR C ECC BU, P2854