Design and Implementation of Secure Subnet Inside of Data Sensitive Network

HTML  Download Download as PDF (Size: 250KB)  PP. 51-57  
DOI: 10.4236/jsea.2013.63B012    3,002 Downloads   4,575 Views  

ABSTRACT

Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even designed impeccable access control policies, we still cannot prevent inside leak. A nature solution is using physical isolation to prevent sensitive data from being leaked outside network; however inside the physical isolated network, data still can be spread from one subnet to another. We present Secure Subnet System, a BLP model base security system that can provide more strong access control, which is called mandatory action control. In our system after a user read sensitive data, system will dynamically change security policies to prevent the user to leak these data or spread the data outside to another subnet. We use a state machine model to describe our system, and use secure transfer equations to dynamically calculate the system policies for each new state. Our model can be proved to be secure by formal methods. We implemented a demon of our system. In this paper we also show the design details of the demon and evaluate the demon both from security and performance. The evaluation results show that the output of the security tests case are under expected; and the performance test case show that, for the 64KB IO chunk size, IO read loss can be improved to 6.6%, IO write loss can be improved to 1.2% after optimization.

Share and Cite:

H. Xue, Y. Zhang, Z. Guo and Y. Dai, "Design and Implementation of Secure Subnet Inside of Data Sensitive Network," Journal of Software Engineering and Applications, Vol. 6 No. 3B, 2013, pp. 51-57. doi: 10.4236/jsea.2013.63B012.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.