Abstract
The secure transmission of information is receiving more and more attention nowadays. Aeolus is a novel platform designed to enhance the development of distributed applications by preventing unauthorized disclosure of information. And one of the most representative systems for information transmission is the file system, therefore it is of great significance to formally analyze the Aeolus-based file system. In this paper, we use Communicating Sequential Processes (CSP) to model and formalize the file system based on Aeolus. Moreover, we utilize the Process Analysis Toolkit (PAT) to simulate and verify the CSP description of our established model. We specifically verify the validity of five properties: Deadlock Freedom, Divergence Freedom, Reachability, Secrecy, and Integrity. The verification results demonstrate that the model successfully satisfies these properties, affirming the effectiveness of the framework in ensuring file operations and guaranteeing the secure transmission of information.
Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Cheng WWY (2009) Information flow for secure distributed applications. PhD thesis, Massachusetts Institute of Technology
Cox RS, Hansen JG, Gribble SD, Levy HM (2006) A safety-oriented platform for web applications. In: 2006 IEEE symposium on security and privacy (S &P’06). IEEE, pp 350–364
Criswell J, Lenharth A, Dhurjati D, Adve V (2007) Secure virtual architecture: A safe execution environment for commodity operating systems. In: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles. pp 351–366
Dalton M, Kannan H, Kozyrakis C (2007) Raksha: a flexible information flow architecture for software security. ACM SIGARCH Comput Archit News 35(2):482–493
Denning DE (1976) A lattice model of secure information flow. Commun of the ACM 19(5):236–243
Denning DER (1982) Cryptography and data security, vol 112. Addison-Wesley Reading
Efstathopoulos P, Krohn M, VanDeBogart S, Frey C, Ziegler D, Kohler E, Mazieres D, Kaashoek F, Morris R (2005) Labels and event processes in the asbestos operating system. ACM SIGOPS Oper Syst Rev 39(5):17–30
Failures divergences refinement: FDR2 manual (2005) Formal systems (europe) ltd. http://www.fsel.com
Fei Y, Zhu H, Yin J (2023) Fvf-aka: A formal verification framework of aka protocols for multi-server iot. Formal Asp Comput 35(4):1–36
Garfinkel T, Pfaff B, Rosenblum M, et al (2004) Ostia: A delegating architecture for secure system call interposition. In: NDSS
Hoare CAR (1978) Communicating sequential processes. Commun of the ACM 21(8):666–677
Hou Z, Yin J, Zhu H (2021) Formalization and verification of dubbo using csp. In: SEKE. pp 154–159
Krohn M, Tromer E (2009) Noninterference for a practical difc-based operating system. In: 2009 30th IEEE symposium on security and privacy. IEEE, pp 61–76
Krohn M, Yip A, Brodsky M, Cliffer N, Kaashoek MF, Kohler E, Morris R (2007) Information flow control for standard os abstractions. ACM SIGOPS Oper Syst Rev 41(6):321–334
Krohn MN (2008) Information flow control for secure web sites. PhD thesis, Massachusetts Institute of Technology
Lampson BW (1973) A note on the confinement problem. Commun ACM 16(10):613–615
Li W, Yang Z, Liu J (2022) Automatic analysis of difc systems using noninterference with declassification. Neural computing and applications. pp 1–12
Lowe G, Roscoe B (1997) Using csp to detect errors in the tmn protocol. IEEE Trans Softw Eng 23(10):659–669
McKee FP (2011) A file system design for the Aeolus security platform. Massachusetts Institute of Technology
Myers AC (1999) Jflow: Practical mostly-static information flow control. In: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. pp 228–241
Myers AC, Liskov B (1997) A decentralized model for information flow control. ACM SIGOPS Oper Syst Rev 31(5):129–142
Myers AC, Chong S, Nystrom N, Zheng L, Zdancewic S (2001) Jif: Java information flow. http://www.cs.cornell.edu/jif
PAT (2023) [Online] Available. http://pat.comp.nus.edu.sg/
Popic V (2010) Audit trails in the Aeolus distributed security platform. Massachusetts Institute of Technology
Roscoe A, Huang J (2013) Checking noninterference in timed csp. Formal Asp Comput 25(1):3–35
Roy I, Porter DE, Bond MD, McKinley KS, Witchel E (2009) Laminar: Practical fine-grained decentralized information flow control. In: Proceedings of the 30th ACM SIGPLAN conference on programming language design and implementation. pp 63–74
Sabelfeld A, Myers AC (2003) Language-based information-flow security. IEEE J Sel Areas Commun 21(1):5–19
States U (1987) Department of Defense Trusted Computer System Evaluation Criteria, vol 83. Department of Defense
Suh GE, Lee JW, Zhang D, Devadas S (2004) Secure program execution via dynamic information flow tracking. ACM Sigplan Not 39(11):85–96
Vandebogart S, Efstathopoulos P, Kohler E, Krohn M, Frey C, Ziegler D, Kaashoek F, Morris R, Mazieres D (2007) Labels and event processes in the asbestos operating system. ACM Trans Comput Syst (TOCS) 25(4):11
Wang HJ, Fan X, Howell J, Jackson C (2007) Protection and communication abstractions for web browsers in mashupos. ACM SIGOPS Oper Syst Rev 41(6):1–16
Wang HJ, Grier C, Moshchuk A, King ST, Choudhury P, Venter H (2009) The multi-principal os construction of the gazelle web browser. In: USENIX security symposium, vol 28
Wang Z, Zhang L, Guo R, Wang G, Qiu J, Su S, Liu Y, Xu G, Tian Z (2023) A covert channel over blockchain based on label tree without long waiting times. Comput Netw 232(109):843
Xiang S, Zhu H, Wu X, Xiao L, Bonsangue M, Xie W, Zhang L (2020) Modeling and verifying the topology discovery mechanism of openflow controllers in software-defined networks using process algebra. Sci Comput Program 187(102):343
Yip A, Narula N, Krohn M, Morris R (2009) Privacy-preserving browser-side scripting with bflow. In: Proceedings of the 4th ACM European conference on Computer systems, pp 233–246
Zeldovich N (2008) Securing untrustworthy software using information flow control. Stanford University
Zeldovich N, Boyd-Wickizer S, Mazieres D (2008) Securing distributed systems with information flow control. NSDI 8:293–308
Zeldovich N, Boyd-Wickizer S, Kohler E, Mazieres D (2011) Making information flow explicit in histar. Commun ACM 54(11):93–101
Author information
Authors and Affiliations
Contributions
Zhiru Hou conducted the research, and drafted the main manuscript. Huibiao Zhu provided valuable contributions to the methodology of this study, and made critical modifications to the manuscript. Lili Xiao and Phan Cong Vinh contributed to data analysis through insightful discussions and analysis.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hou, Z., Xiao, L., Zhu, H. et al. Formalization and Analysis of Aeolus-based File System from Process Algebra Perspective. Mobile Netw Appl 29, 273–285 (2024). https://doi.org/10.1007/s11036-024-02332-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-024-02332-w