A formal approach to the integrated analysis of security and QoS

Concurrent and distributed systems are subject to several requirements of different nature. Among them security and quality of service (QoS) are two fundamental aspects, which can have a profound impact on the system performability. Unfortunately, the study of the tradeoff between security guarantees and performance needs is hard to accomplish, because the related analysis activities are usually carried out separately. In this paper, we present an integrated and tool-supported methodology encompassing both activities, which can provide insights about how to trade the QoS delivered by a system with its security guarantees. The methodology is illustrated by assessing the effectiveness and the efficiency of the securing strategy implemented in the NRL Pump, a trusted device proposed to secure the replication of information from a low-security level enclave to a high-security level enclave.

[1]  Andrew C. Simpson,et al.  Safety through security , 1998, Proceedings Ninth International Workshop on Software Specification and Design.

[2]  Bruno Dutertre,et al.  From security to safety and back , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).

[3]  Mario Bravetti,et al.  A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .

[4]  Stephen S. Lavenberg,et al.  Computer Performance Modeling Handbook , 1983, Int. CMG Conference.

[5]  Roberto Gorrieri,et al.  A Classification of Security Properties , 1993 .

[6]  Chris Hankin,et al.  Approximate non-interference , 2004 .

[7]  Sushil Jajodia,et al.  Computer Security, Fault Tolerance, And Software Assurance , 1999, IEEE Concurrency.

[8]  Alessandro Aldini,et al.  Assessing the impact of dynamic power management on the functionality and the performance of battery-powered appliances , 2004, International Conference on Dependable Systems and Networks, 2004.

[9]  Roberto Gorrieri,et al.  Security Analysis of a Probabilistic Non-repudiation Protocol , 2002, PAPM-PROBMIV.

[10]  Jonathan K. Millen,et al.  Non-interference, who needs it? , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[11]  Catherine A. Meadows,et al.  What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis , 2003, ESOP.

[12]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[13]  Paolo Ciancarini,et al.  Stochastic Process Algebra: From an Algebraic Formalism to an Architectural Description Language , 2002, Performance.

[14]  Gavin Lowe,et al.  Quantifying information flow , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[15]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[16]  Alessandro Aldini,et al.  An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth , 2004, SAFECOMP.

[17]  Andrea Maggiolo-Schettini,et al.  A Classification of Time and/or Probability Dependent Security Properties , 2006, Electron. Notes Theor. Comput. Sci..

[18]  Alessandro Aldini,et al.  TwoTowers 4.0: towards the integration of security analysis and performance evaluation , 2004 .

[19]  Enrico Tronci,et al.  Automatic Analysis of the NRL Pump , 2004, Electron. Notes Theor. Comput. Sci..

[20]  Myong H. Kang,et al.  Design and assurance strategy for the NRL pump , 1997, Proceedings 1997 High-Assurance Engineering Workshop.

[21]  B. Di Vito A model of cooperative noninterference for integrated modular avionics , 1999, Dependable Computing for Critical Applications 7.

[22]  Roberto Gorrieri,et al.  A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..

[23]  William J. Stewart,et al.  Introduction to the numerical solution of Markov Chains , 1994 .

[24]  Alessandro Aldini,et al.  TwoTowers 4.0: towards the integration of security analysis and performance evaluation , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..

[25]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.

[26]  Ralf Steinmetz,et al.  On Availability QoS for Replicated Multimedia Service and Content , 2002, IDMS/PROMS.

[27]  LanotteRuggero,et al.  Automatic Analysis of the NRL Pump , 2004 .

[28]  Roberto Gorrieri,et al.  Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..

[29]  Mario Bravetti,et al.  Performance measure sensitive congruences for Markovian process algebras , 2003, Theor. Comput. Sci..