Modeling and verifying TESAC using CSP

Dongzhen Sun, Huibiao Zhu, Yuan Fei, Lili Xiao, Gang Lu, Jiaqi Yin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cloud computing is an emerging computing paradigm in IT industries. The wide adoption of cloud computing is raising concerns about management of data in the cloud. Access control and security are two critical issues of cloud computing. Time efficient secure access control (TESAC) model is a new data access control scheme which can minimise many significant problems. This scheme has better performance than other existing models in a cloud computing environment. TESAC is attracting more and more attentions from industries. Hence, the reliability of TESAC becomes extremely important. In this paper, we apply Communication Sequential Processes (CSP) to model TESAC, as well as their security properties. We mainly focus on its data access mechanism part and formalize it in detail. Moreover, using the model checker Process Analysis Toolkit (PAT), we have verified that the TESAC model cannot assure the security of data with malicious users. For the purpose of solving this problem we introduce a new method similar to digital signature. Our study can improve the security and robustness of the TESAC model.

Original languageEnglish
Title of host publicationProceedings - SEKE 2019
Subtitle of host publication31st International Conference on Software Engineering and Knowledge Engineering
PublisherKnowledge Systems Institute Graduate School
Pages265-270
Number of pages6
ISBN (Electronic)1891706489
DOIs
StatePublished - 2019
Externally publishedYes
Event31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019 - Lisbon, Portugal
Duration: 10 Jul 201912 Jul 2019

Publication series

NameProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
Volume2019-July
ISSN (Print)2325-9000
ISSN (Electronic)2325-9086

Conference

Conference31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019
Country/TerritoryPortugal
CityLisbon
Period10/07/1912/07/19

Keywords

  • Access control
  • Cloud computing
  • CSP
  • Modeling
  • TESAC
  • Verification

Fingerprint

Dive into the research topics of 'Modeling and verifying TESAC using CSP'. Together they form a unique fingerprint.

Cite this