@inproceedings{2c44754efe804d86b52c7b91808ce07b,
title = "Modeling and verifying TESAC using CSP",
abstract = "Cloud computing is an emerging computing paradigm in IT industries. The wide adoption of cloud computing is raising concerns about management of data in the cloud. Access control and security are two critical issues of cloud computing. Time efficient secure access control (TESAC) model is a new data access control scheme which can minimise many significant problems. This scheme has better performance than other existing models in a cloud computing environment. TESAC is attracting more and more attentions from industries. Hence, the reliability of TESAC becomes extremely important. In this paper, we apply Communication Sequential Processes (CSP) to model TESAC, as well as their security properties. We mainly focus on its data access mechanism part and formalize it in detail. Moreover, using the model checker Process Analysis Toolkit (PAT), we have verified that the TESAC model cannot assure the security of data with malicious users. For the purpose of solving this problem we introduce a new method similar to digital signature. Our study can improve the security and robustness of the TESAC model.",
keywords = "Access control, Cloud computing, CSP, Modeling, TESAC, Verification",
author = "Dongzhen Sun and Huibiao Zhu and Yuan Fei and Lili Xiao and Gang Lu and Jiaqi Yin",
note = "Publisher Copyright: {\textcopyright} 2019 Knowledge Systems Institute Graduate School. All rights reserved.; 31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019 ; Conference date: 10-07-2019 Through 12-07-2019",
year = "2019",
doi = "10.18293/SEKE2019-122",
language = "英语",
series = "Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE",
publisher = "Knowledge Systems Institute Graduate School",
pages = "265--270",
booktitle = "Proceedings - SEKE 2019",
}