首页    期刊浏览 2024年09月15日 星期日
登录注册

文章基本信息

  • 标题:Design and Implementation of Secure Subnet Inside of Data Sensitive Network
  • 本地全文:下载
  • 作者:Haiwei Xue ; Yunliang Zhang ; Zhien Guo
  • 期刊名称:Journal of Software Engineering and Applications
  • 印刷版ISSN:1945-3116
  • 电子版ISSN:1945-3124
  • 出版年度:2013
  • 卷号:6
  • 期号:3B
  • 页码:51-57
  • DOI:10.4236/jsea.2013.63B012
  • 出版社:Scientific Research Publishing
  • 摘要:Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even designed impeccable access control policies, we still cannot prevent inside leak. A nature solution is using physical isolation to prevent sensitive data from being leaked outside network; however inside the physical isolated network, data still can be spread from one subnet to another. We present Secure Subnet System, a BLP model base security system that can provide more strong access control, which is called mandatory action control. In our system after a user read sensitive data, system will dynamically change security policies to prevent the user to leak these data or spread the data outside to another subnet. We use a state machine model to describe our system, and use secure transfer equations to dynamically calculate the system policies for each new state. Our model can be proved to be secure by formal methods. We implemented a demon of our system. In this paper we also show the design details of the demon and evaluate the demon both from security and performance. The evaluation results show that the output of the security tests case are under expected; and the performance test case show that, for the 64KB IO chunk size, IO read loss can be improved to 6.6%, IO write loss can be improved to 1.2% after optimization.
  • 关键词:Component; Privacy; Netwrok Security; Access Control; Inside Leak; Security Model; BLP
国家哲学社会科学文献中心版权所有