Formalization and Verification of TESAC Using CSP

被引:1
作者
Sun, Dongzhen [1 ]
Zhu, Huibiao [1 ]
Fei, Yuan [2 ]
Xiao, Lili [1 ]
Lu, Gang [1 ]
Yin, Jiaqi [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
[2] Shanghai Normal Univ, Sch Informat Mech & Elect Engn, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
TESAC; cloud computing; CSP; access control; modeling; verification;
D O I
10.1142/S0218194019400199
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is an emerging computing paradigm in IT industries. The wide adoption of cloud computing is raising concerns about management of data in the cloud. Access control and data security are two critical issues of cloud computing. Time-efficient secure access control (TESAC) model is a new data access control scheme which can minimize many significant problems. This scheme has better performance than other existing models in a cloud computing environment. TESAC is attracting more and more attentions from industries. Hence, the reliability of TESAC becomes extremely important. In this paper, we apply Communication Sequential Processes (CSP) to model TESAC, as well as their security properties. We mainly focus on its data access mechanism part and formalize it in detail. Moreover, using the model checker Process Analysis Toolkit (PAT), we have verified that the TESAC model cannot assure the security of data with malicious users. For the purpose of solving this problem, we introduce a new method similar to digital signature. Our study can improve the security and robustness of the TESAC model.
引用
收藏
页码:1741 / 1760
页数:20
相关论文
共 25 条
[1]  
Agarwal V., 2012, CLOUD COMPUTING HIGH
[2]  
[Anonymous], 2012, INT J SOFT COMPUTING
[3]  
[Anonymous], 2012, P 7 INT C INT MON PR
[4]  
Armbrust Michael, 2009, University of California, Berkeley, DOI DOI 10.1145/1721654.1721672
[5]  
Ausanka-Crues R., 2001, METHODS ACCESS CONTR, DOI 10.1.1.596.2814.
[6]   A THEORY OF COMMUNICATING SEQUENTIAL PROCESSES [J].
BROOKES, SD ;
HOARE, CAR ;
ROSCOE, AW .
JOURNAL OF THE ACM, 1984, 31 (03) :560-599
[7]  
Chen DW, 2009, LECT NOTES COMPUT SC, V5931, P559, DOI 10.1007/978-3-642-10665-1_52
[8]   Modeling and Verifying NDN Access Control Using CSP [J].
Fei, Yuan ;
Zhu, Huibiao .
FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 :143-159
[9]  
Ferraiolo D. F., ARXIV09032171ACCR
[10]  
Hoare C.A.R., 1985, Communicating Sequential Processes