Read-Write Abortion (RWA) Based Synchronization Protocols to Prevent Illegal Information Flow

被引:12
|
作者
Nakamura, Shigenari [1 ]
Duolikun, Dilewaer [1 ]
Aikebaier, Ailixier [2 ]
Enokido, Tomoya [3 ]
Takizawa, Makoto [1 ]
机构
[1] Hosei Univ, Tokyo, Japan
[2] NICT, Tokyo, Japan
[3] Rissho Univ, Tokyo, Japan
关键词
Role-based access control (RBAC) model; Illegal write; Suspicious read; Impossible write; Information flow control; RWA-RBS protocol; RWA-OBS protocol;
D O I
10.1109/NBiS.2014.48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In information systems, data in an object may illegally flow into another object if transactions read and write the objects. A transaction illegally reads an object if data in objects which the transaction is not allowed to read are stored in the object. In addition, it is specified data in which object is allowed to flow to other objects. A suspicious object is an object which is not allowed to flow to some object. A transaction suspiciously reads an object if the object is suspicious. If a transaction T writes an object o(j) after suspiciously reading an object o(i), data in the object o(i) might flow to the object o(j). Here, if information flow from the object o(i) to the object o(j) is not allowed, the transaction T impossibly writes the object o(i). In our previous studies, the read-abortion (RA) role-based synchronization (RA-RBS) and object-based synchronization (RA-OBS) protocols are discussed where a transaction is aborted if the transaction illegally reads an object. Write-abortion (WA) based protocols WA-RBS and WA-OBS are also proposed based on abortion of transactions illegally and impossibly writing objects in our previous studies. In this paper, we newly propose RWA-RBS and RWA-OBS protocols where a transaction is aborted if the transaction illegally reads an object or impossibly writes an object. We evaluate the RWA-RBS and RWA-OBS protocols in terms of number of transactions aborted. We show the smallest number of transactions are aborted in the WA types of protocols.
引用
收藏
页码:120 / 127
页数:8
相关论文
共 50 条
  • [1] A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow
    Nakamura, Shigenari
    Duolikun, Dilewaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 155 - 162
  • [2] A flexible read-write abortion protocol to prevent illegal information flow among objects
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Takizawa, Makoto
    Enokido, Tomoya
    [J]. Journal of Mobile Multimedia, 2015, 11 (3-4): : 263 - 280
  • [3] A Flexible Read-Write Abortion Protocol with Sensitivity of Objects to Prevent Illegal Information Flow
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS CISIS 2015, 2015, : 289 - 296
  • [4] Read-abortion (RA) based synchronization protocols to prevent illegal information flow
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Takizawa, Makoto
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) : 1441 - 1451
  • [5] A flexible read-write abortion protocol with role safety concept to prevent illegal information flow
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (05) : 1415 - 1425
  • [6] A flexible read-write abortion protocol with role safety concept to prevent illegal information flow
    Shigenari Nakamura
    Tomoya Enokido
    Makoto Takizawa
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1415 - 1425
  • [7] A read-write abortion protocol to prevent illegal information flow in role-based access control systems
    Nakamura, Shigenari
    Duolikun, Dilawaer
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2016, 6 (01) : 43 - 53
  • [8] Characterization with embedded synchronization for read-write channels
    Lin, MY
    Bergmans, JWM
    Mathew, G
    Foo, SW
    [J]. IEEE TRANSACTIONS ON MAGNETICS, 2001, 37 (04) : 1953 - 1956
  • [9] Synchronization Protocols to Prevent Illegal Information Flow in Role-based Access Control Systems
    Nakamura, Shigenari
    Doulikun, Dilewaer
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 279 - 286
  • [10] Relaxed Synchronization with Ordered Read-Write Locks
    Gustedt, Jens
    Jeanvoine, Emmanuel
    [J]. EURO-PAR 2011: PARALLEL PROCESSING WORKSHOPS, PT I, 2012, 7155 : 387 - 397