Abstract

To solve the problems associated with the application of multilevel security to actual networks, such as flexibility, availability, security, and secure communication, this study proposes a multilevel security network communication model based on multidimensional control. In the model, access control is retained on the basis of security labels. In addition, relational restraints among protection domains, credibility degree restraints of subjects on security attributes, aggregation inference control restraints, and secure tunnel control restraints are introduced and applied. Thus, secure information exchange within a multilevel security network information system is ensured. Moreover, using this model, multilevel security virtual networks with logical and independent characteristics can be built to accomplish secure interconnection and communication between nonequivalent members, thereby reducing the probability of information leakage. Finally, the security of the model is confirmed by applying the nontransitive, noninterference theory, and the typical application of the model in actual networks is described.

Highlights

  • The rapid development of cloud computing [1], 5G [2], Internet of ings (IoT) [3], and other emerging technologies has brought great convenience to people, these technologies pose a threat to the security of network and information owing to their openness, data sharing, and other characteristics [4,5,6]

  • (3) To verify the security and credibility of the model, we confirm the security of the model based on the noninterference theory, perform a comparative analysis of the security provided by the proposed model and existing models, and provide the typical application of the model in actual networks

  • (3) In the application layer, the relationship between objects is analyzed, control constraints are deduced based on aggregation, the access of subjects to relational objects is restricted, multilevel security is extended from security label access control to object relationship so as to reduce the risk of information leakage caused by object information aggregation, and the restriction of the BLP model on confidentiality security attributes is enhanced

Read more

Summary

Introduction

The rapid development of cloud computing [1], 5G [2], Internet of ings (IoT) [3], and other emerging technologies has brought great convenience to people, these technologies pose a threat to the security of network and information owing to their openness, data sharing, and other characteristics [4,5,6]. The aforementioned studies provided effective guidance for secure interconnection of multilevel security networks, data flow control in communication, and secure access between hosts and objects at different levels, they could not adequately solve the security problems faced by multilevel security in network applications. Problems such as object aggregation inferring highly sensitive information and poor flexibility of communication between hosts and objects at different levels still exist. (3) To verify the security and credibility of the model, we confirm the security of the model based on the noninterference theory, perform a comparative analysis of the security provided by the proposed model and existing models, and provide the typical application of the model in actual networks

Model Building Concept
Model Multilevel Security Control Constraint Rules
Protection Domain Control Constraints
Subject Credibility Constraints
Subject-Object Level Adjustment Constraints
Security Label Mapping Constraints
Multilevel Security Virtual Network
Model Security Analysis
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.