Abstract

Due to the confidentiality of the classified information system, it is isolated from the external network, but it is necessary to exchange data with an external network. This makes data exchange security between classified networks an important problem. Previous research focused on using access control policies to limit data access at different security levels, using some security checks to detect the security of the data itself. The security threat of the access control policy itself will threaten the data exchange between the classified networks. Moreover, the data should be performed security check isolated from user during the physical transmission to prevent the attack behavior which bypass the data security check from the user side. At present, the cross-network isolation and data exchange models are designed based on fixed business scenarios and lack generality. Therefore, this paper proposes a Turing machine-based theoretical model for cross-network isolated data exchange. This model consists of two parts: the proof system module and the physical transmission channel module. The proof system module uses an interactive Turing machine to model the part of the operational security and data security check of the communicating party’s authority to provide security and versatility. The physical transmission channel module isolates different networks and provides a detection mechanism independent of the communication parties to ensure the security and efficiency of the transmission. The proof given shows that the theoretical model can exchange data efficiently and safely. Finally, based on the given theoretical model, an intuitive cross-network isolation and data exchange function model is constructed in the form of a functional tree to illustrate the model versatility.

Highlights

  • In the classified information system, the security of data is always concerned

  • The isolation security model based on anomaly detection pre-establishes various application behavior patterns to detect anomalies, the isolation security model based on anomaly detection pre-establishes various application behavior pattern detection anomalies, which is possibly invalid for the new attack application behavior pattern

  • This paper is based on the principle that all operations are within the legal scope, and all changes are within the legal scope to detect the security of data exchange between the classified networks

Read more

Summary

INTRODUCTION

In the classified information system, the security of data is always concerned. The security of data exchange of the network platform - the classified network, which is composed of all the data in the classified information system, directly affects the data security of the classified information system. That is to use Turing machine to construct a model for data exchange between classified networks - cross-network isolation and data exchange model, this formal model facilitates the strict proof of the security of data exchange, and can describe various security protocol. It can add or reduce the security detection component according to the security requirements of the classified network itself to reduce the redundancy and the Turing machine itself does not pose a security challenge

TURING MACHINE MODEL
PERMISSION-BASED CLASSIFIED NETWORK
PROOF SYSTEM
PHYSICAL TRANSMISSION CHANNEL Definition 8
CROSS-NETWORK ISOLATION AND DATA EXCHANGE MODEL
DATA EXCHANGE SECURITY CERTIFICATES
FUNCTIONAL MODEL RATIONALITY VERIFICATION
MODEL SAFETY ASSESSMENT
MODEL PERFORMANCE EVALUATION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.