Formal description of perfect security

  • Authors:
  • S. V. Raghavan;N. Dhyanesh

  • Affiliations:
  • Network Systems Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai 600036 INDIA;Network Systems Laboratory, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai 600036 INDIA

  • Venue:
  • ICCC '02 Proceedings of the 15th international conference on Computer communication
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security is the prime concern in present day computing. The existing literature deals with the ways in which system security gets breached, the people involved in such activities (hackers) and their techniques. An equal amount of work has gone into preventive and corrective measures for security.A very large fraction of existing effort is based on what could be described as a 'stimuli-response' approach to security; characterized by the repetition of the following cycle: hackers find a loophole in the system, hack the system, system designers become aware of the attack and trace the loophole, they offer a patch to fix the loophole, system functions properly until hackers find another loophole.Intuitively, one can realize that, such a treatment of a subject, progressively growing in its importance, cannot lead us to permanent solutions and foolproof architectures. Though workable solutions may seem near at hand, they would not be durable and would need frequent replacement.Hence, a more systematic and formal treatment of the subject of security will be more appropriate. Such a treatment enables one to conceptualize the property of security associated with a system, and the phenomenon of a security breach, in a more concrete fashion. This is expected to lead one to more definitive results and enduring architectures for system security.This paper seeks to describe security from a theoretical perspective. We begin with the observation of an isolated, standalone system and build a formalism for the security of such a system by prescribing adherence to a defined model of systems. We then proceed to the case of a network of systems and extend the formalism for the security of such a network. Not only does this paper describe the evolution of the thought process associated with the construction of the formalism, but also proposes sample system architectures within the framework of the formalism, that can translate directly into real world implementations. Sample architectures are provided for a single system as well as a network of systems.In conclusion, we present an analysis and evaluation of the formalism and associated architecture. We also discuss means of realizing the framework of the formalism in modern computing environments, detailing the design process involved in the same, through a case study.