Formal modeling and verification of security controls for multimedia systems in the cloud

被引:0
|
作者
Masoom Alam
Saif-ur-Rehman Malik
Qaisar Javed
Abid Khan
Shamaila Bisma Khan
Adeel Anjum
Nadeem Javed
Adnan Akhunzada
Muhammad Khurram Khan
机构
[1] COMSATS Institute of Information Technology,Cyber Security Lab, Department of Computer Science
[2] International Islamic University,Department of Computer Science & Software Engineering
[3] King Saud University,Center of Excellence in Information Assurance (CoEIA)
来源
关键词
Formal analysis; Formal verification; HLPN; Modeling; SIEM; SMT; Z3;
D O I
暂无
中图分类号
学科分类号
摘要
Organizations deploy the Security Information and Event Management (SIEM) systems for centralized management of security alerts for securing their multimedia content. The SIEM system not only preserves events data, generated by devices and applications, in the form of logs but also performs real-time analysis of the event data. The SIEM works as the Security Operation Centre (SOC) in an organization, therefore, errors in the SIEM may compromise the security of the organization. In addition to focusing on the architecture, features, and the performance of the SIEM, it is imperative to carry out a formal analysis to verify that the system is impeccable. The ensuing research focuses mainly on the formal verification of the OSTORM a SIEM system. We have used High-Level Petri Nets (HLPN) and Z language to model and analyze the system. Moreover, Satisfiability Modulo Theories Library (SMT-Lib) and Z3 solver are used in this research to prove the correctness of the overall working of the OSTORM system. We demonstrate the correctness of the underlying system based on four security properties, namely: a) event data confidentiality, b) authentication, c) event data integrity, and d) alarm integrity. The results reveal that the OSTORM system functions correctly.
引用
收藏
页码:22845 / 22870
页数:25
相关论文
共 50 条
  • [41] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [42] Formal Verification and Visualization of Security Policies
    Wahsheh, Luay A.
    de Leon, Daniel Conte
    Alves-Foss, Jim
    JOURNAL OF COMPUTERS, 2008, 3 (06) : 22 - 31
  • [43] Modeling and formal verification of IMPP
    Khan, S
    Waheed, A
    SERP'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2003, : 522 - 528
  • [44] FORMAL MODELING AND VERIFICATION OF MICROPROCESSORS
    WINDLEY, PJ
    IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (01) : 54 - 72
  • [45] Formal Modeling and Verification for MVB
    Xia, Mo
    Lo, Kueiming
    Shao, Shuangjia
    Sun, Mian
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [46] A Method for Revealing and Addressing Security Vulnerabilities in Cyber-Physical Systems by Modeling Malicious Agent Interactions with Formal Verification
    Wardell, Dean C.
    Mills, Robert F.
    Peterson, Gilbert L.
    Oxley, Mark E.
    COMPLEX ADAPTIVE SYSTEMS, 2016, 95 : 24 - 31
  • [47] How formal analysis and verification add security to blockchain-based systems
    Matsuo, Shin'ichiro
    PROCEEDINGS OF THE 17TH CONFERENCE ON FORMAL METHODS IN COMPUTER AIDED DESIGN (FMCAD 2017), 2017, : 1 - 4
  • [48] Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service
    Rezaee, Ali
    Rahmani, Amir Masoud
    Movaghar, Ali
    Teshnehlab, Mohammad
    JOURNAL OF SUPERCOMPUTING, 2014, 67 (02): : 345 - 383
  • [49] A Formal Modeling and Verification Approach for IoT-Cloud Resource-Oriented Applications
    Hellal, Yasmine Gara
    Hamel, Lazhar
    Graiet, Mohamed
    Balouek, Daniel
    2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING, CCGRID 2024, 2024, : 360 - 369
  • [50] Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service
    Ali Rezaee
    Amir Masoud Rahmani
    Ali Movaghar
    Mohammad Teshnehlab
    The Journal of Supercomputing, 2014, 67 : 345 - 383