Formal modeling and verification of security controls for multimedia systems in the cloud

被引:0
|
作者
Masoom Alam
Saif-ur-Rehman Malik
Qaisar Javed
Abid Khan
Shamaila Bisma Khan
Adeel Anjum
Nadeem Javed
Adnan Akhunzada
Muhammad Khurram Khan
机构
[1] COMSATS Institute of Information Technology,Cyber Security Lab, Department of Computer Science
[2] International Islamic University,Department of Computer Science & Software Engineering
[3] King Saud University,Center of Excellence in Information Assurance (CoEIA)
来源
Multimedia Tools and Applications | 2017年 / 76卷
关键词
Formal analysis; Formal verification; HLPN; Modeling; SIEM; SMT; Z3;
D O I
暂无
中图分类号
学科分类号
摘要
Organizations deploy the Security Information and Event Management (SIEM) systems for centralized management of security alerts for securing their multimedia content. The SIEM system not only preserves events data, generated by devices and applications, in the form of logs but also performs real-time analysis of the event data. The SIEM works as the Security Operation Centre (SOC) in an organization, therefore, errors in the SIEM may compromise the security of the organization. In addition to focusing on the architecture, features, and the performance of the SIEM, it is imperative to carry out a formal analysis to verify that the system is impeccable. The ensuing research focuses mainly on the formal verification of the OSTORM a SIEM system. We have used High-Level Petri Nets (HLPN) and Z language to model and analyze the system. Moreover, Satisfiability Modulo Theories Library (SMT-Lib) and Z3 solver are used in this research to prove the correctness of the overall working of the OSTORM system. We demonstrate the correctness of the underlying system based on four security properties, namely: a) event data confidentiality, b) authentication, c) event data integrity, and d) alarm integrity. The results reveal that the OSTORM system functions correctly.
引用
收藏
页码:22845 / 22870
页数:25
相关论文
共 50 条
  • [31] Formal Modeling and Verification of Interlocking Systems Featuring Sequential Release
    Vu, Linh H.
    Haxthausen, Anne E.
    Peleska, Jan
    FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS, FTSCS 2014, 2015, 476 : 223 - 238
  • [32] Formal modeling and verification of real-time concurrent systems
    Yan, Fei
    Tang, Tao
    2007 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY, PROCEEDINGS, 2007, : 219 - 224
  • [33] Formal Modeling and Verification of Blockchain Consensus Protocol for IoT Systems
    Baouya, Abdelhakim
    Chehida, Salim
    Bensalem, Saddek
    Bozga, Marius
    KNOWLEDGE INNOVATION THROUGH INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_20), 2020, 327 : 330 - 342
  • [34] Reuse of components in formal modeling and verification of distributed control systems
    Vyatkin, Valeriy
    Hanisch, Hans-Michael
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 129 - 134
  • [35] A framework for heterogeneous formal modeling and compositional verification of avionics systems
    Aït-Ameur, Y
    Delmas, R
    Wiels, R
    Second ACM and IEEE International Conference on Formal Methods and Models for Co-Design, Proceedings, 2004, : 223 - 232
  • [36] Formal modeling and verification of systems with self-x properties
    Guedemann, Matthias
    Ortmeier, Frank
    Reif, Wolfgang
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 38 - 47
  • [37] Formal modeling and verification of high-availability protocol for network security appliances
    Kim, Moonzoo
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 489 - 500
  • [38] Verification of Cloud Security Policies
    Miller, Loic
    Merindol, Pascal
    Gallais, Antoine
    Pelsser, Cristel
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [39] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [40] Formal Verification and Security Analysis of AMQP
    Liu, Huiying
    Dong, Wenting
    Zhu, Huibiao
    Su, Ziqing
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2177 - 2182