Skip to main content

2018 | OriginalPaper | Buchkapitel

Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems

verfasst von : Christopher Gerking, David Schubert

Erschienen in: Software Architecture

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A key challenge of component-based software engineering is to preserve extra-functional properties such as security when composing the software architecture from individual components. Previous work in this area does not consider specific characteristics of cyber-physical systems like asynchronous message passing, real-time behavior, or so-called feedback composition with two-way communication. Thereby, a composition of secure components might lead to insecure architectures with undetected information leaks. In this paper, we address the preservation of information flow security on composition of cyber-physical systems, taking the above characteristics into account. We refine security policies during the architectural decomposition, and outline a compositional verification approach that checks the security of individual components against their refined policies. On composition of secure components, our approach preserves security and thereby enables the design of secure software architectures. We give a proof of concept using a component-based software architecture of a cyber-manufacturing system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chong, S., van der Meyden, R.: Using architecture to reason about information security. ACM Trans. Inf. Syst. Secur. 18(2), 8:1–8:30 (2015)CrossRef Chong, S., van der Meyden, R.: Using architecture to reason about information security. ACM Trans. Inf. Syst. Secur. 18(2), 8:1–8:30 (2015)CrossRef
3.
Zurück zum Zitat Crnkovic, I., Malavolta, I., Muccini, H., Sharaf, M.: On the use of component-based principles and practices for architecting cyber-physical systems. In: CBSE 2016, pp. 23–32. IEEE (2016) Crnkovic, I., Malavolta, I., Muccini, H., Sharaf, M.: On the use of component-based principles and practices for architecting cyber-physical systems. In: CBSE 2016, pp. 23–32. IEEE (2016)
8.
Zurück zum Zitat Mantel, H.: On the composition of secure systems. In: IEEE S&P, pp. 88–101. IEEE (2002) Mantel, H.: On the composition of secure systems. In: IEEE S&P, pp. 88–101. IEEE (2002)
10.
Zurück zum Zitat McCullough, D.: Noninterference and the composability of security properties. In: IEEE S&P, pp. 177–186. IEEE (1988) McCullough, D.: Noninterference and the composability of security properties. In: IEEE S&P, pp. 177–186. IEEE (1988)
11.
Zurück zum Zitat Mohammad, M., Alagar, V.S.: A formal approach for the specification and verification of trustworthy component-based systems. J. Syst. Softw. 84(1), 77–104 (2011)CrossRef Mohammad, M., Alagar, V.S.: A formal approach for the specification and verification of trustworthy component-based systems. J. Syst. Softw. 84(1), 77–104 (2011)CrossRef
14.
Zurück zum Zitat Sun, C., Xi, N., Li, J., Yao, Q., Ma, J.: Verifying secure interface composition for component-based system designs. In: APSEC 2014, pp. 359–366. IEEE (2014) Sun, C., Xi, N., Li, J., Yao, Q., Ma, J.: Verifying secure interface composition for component-based system designs. In: APSEC 2014, pp. 359–366. IEEE (2014)
15.
Zurück zum Zitat Zakinthinos, A., Lee, E.S.: How and why feedback composition fails. In: CSFW 1996, pp. 95–101. IEEE (1996) Zakinthinos, A., Lee, E.S.: How and why feedback composition fails. In: CSFW 1996, pp. 95–101. IEEE (1996)
16.
Zurück zum Zitat Zhou, J., Alves-Foss, J.: Security policy refinement and enforcement for the design of multi-level secure systems. J. Comput. Secur. 16(2), 107–131 (2008)CrossRef Zhou, J., Alves-Foss, J.: Security policy refinement and enforcement for the design of multi-level secure systems. J. Comput. Secur. 16(2), 107–131 (2008)CrossRef
Metadaten
Titel
Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems
verfasst von
Christopher Gerking
David Schubert
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00761-4_10