跳到主要导航 跳到搜索 跳到主要内容

Modeling and verifying TESAC using CSP

  • Dongzhen Sun
  • , Huibiao Zhu*
  • , Yuan Fei
  • , Lili Xiao
  • , Gang Lu
  • , Jiaqi Yin
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Cloud computing is an emerging computing paradigm in IT industries. The wide adoption of cloud computing is raising concerns about management of data in the cloud. Access control and security are two critical issues of cloud computing. Time efficient secure access control (TESAC) model is a new data access control scheme which can minimise many significant problems. This scheme has better performance than other existing models in a cloud computing environment. TESAC is attracting more and more attentions from industries. Hence, the reliability of TESAC becomes extremely important. In this paper, we apply Communication Sequential Processes (CSP) to model TESAC, as well as their security properties. We mainly focus on its data access mechanism part and formalize it in detail. Moreover, using the model checker Process Analysis Toolkit (PAT), we have verified that the TESAC model cannot assure the security of data with malicious users. For the purpose of solving this problem we introduce a new method similar to digital signature. Our study can improve the security and robustness of the TESAC model.

源语言英语
主期刊名Proceedings - SEKE 2019
主期刊副标题31st International Conference on Software Engineering and Knowledge Engineering
出版商Knowledge Systems Institute Graduate School
265-270
页数6
ISBN(电子版)1891706489
DOI
出版状态已出版 - 2019
活动31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019 - Lisbon, 葡萄牙
期限: 10 7月 201912 7月 2019

出版系列

姓名Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
2019-July
ISSN(印刷版)2325-9000
ISSN(电子版)2325-9086

会议

会议31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019
国家/地区葡萄牙
Lisbon
时期10/07/1912/07/19

指纹

探究 'Modeling and verifying TESAC using CSP' 的科研主题。它们共同构成独一无二的指纹。

引用此