Formal Verification of the xDAuth Protocol

被引:12
|
作者
Alam, Quratulain [1 ]
Tabbasum, Saher [2 ]
Malik, Saif U. R. [2 ]
Alam, Masoom [2 ]
Ali, Tamleek [1 ]
Akhunzada, Adnan [3 ]
Khan, Samee U. [4 ]
Vasilakos, Athanasios V. [5 ]
Buyya, Rajkumar [6 ]
机构
[1] Inst Management Sci, Dept Comp Sci, Peshawar 25000, Pakistan
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad 45550, Pakistan
[3] Univ Malaya, Ctr Mobile Cloud Comp Res, Kuala Lumpur 50603, Malaysia
[4] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58108 USA
[5] Lule Univ Technol, Dept Comp Sci Elect & Space Engn, SE-93187 Skelleftea, Sweden
[6] Univ Melbourne, Dept Comp & Informat Syst, Cloud Comp & Distributed Syst Lab, Parkville, Vic 3010, Australia
关键词
Cross domain access control framework; formal methods; high-level Petri nets (HLPN); information security; modeling; and verification; SMT; service oriented architecture (SOA); xDAuth protocol; Z3; ACCESS-CONTROL; SECURITY; TAXONOMY;
D O I
10.1109/TIFS.2016.2561909
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Service-oriented architecture offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using high-level Petri nets to understand the protocol information flow in a distributed environment. We analyze the rules of information flow using Z language, while Z3 SMT solver is used for the verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g., secure secret key authentication, and Chinese wall security policy and secrecy specific properties, e.g., confidentiality, integrity, and authenticity.
引用
收藏
页码:1956 / 1969
页数:14
相关论文
共 50 条
  • [1] Formal Verification of the FDO Protocol
    Bussa, Simone
    Sisto, Riccardo
    Valenza, Fulvio
    [J]. 2023 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING, CSCN, 2023, : 290 - 295
  • [2] Formal verification for a PMQTT protocol
    Elemam, Eman
    Bahaa-Eldin, Ayman M.
    Shaker, Nabil H.
    Sobh, Mohamed
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2020, 21 (03) : 169 - 182
  • [3] Formal specification and verification of a micropayment protocol
    Gouda, MG
    Liu, AX
    [J]. ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 489 - 494
  • [4] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [5] Applying formal verification with protocol compiler
    Stangier, C
    Holtmann, U
    [J]. EUROMICRO SYMPOSIUM ON DIGITAL SYSTEMS DESIGN, PROCEEDINGS, 2001, : 165 - 169
  • [6] Modelling and Formal Verification of the NEO Protocol
    Choppy, Christine
    Dedova, Anna
    Evangelista, Sami
    Klai, Kais
    Petrucci, Laure
    Youcef, Samir
    [J]. TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY VI, 2012, 7400 : 197 - 225
  • [7] FORMAL TECHNIQUES FOR PROTOCOL SPECIFICATION AND VERIFICATION
    SUNSHINE, C
    [J]. COMPUTER, 1979, 12 (09) : 20 - 27
  • [8] Formal Verification Technology for Asynchronous Communication Protocol
    Hu, Yayun
    Li, Dongfang
    [J]. 2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 482 - 486
  • [9] Formal Verification for KMB09 Protocol
    Guiping Dai
    [J]. International Journal of Theoretical Physics, 2019, 58 : 3651 - 3657
  • [10] Formal Verification on Distributed Spectrum Sensing Protocol
    Liu, Jin-bo
    Liao, Ming-xue
    Hu, Xiao-hui
    He, Xiao-xin
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 190 - 194