Use of the PVS formal logic system in the method of formal proof of security in the construction of information security systems

Authors

DOI:

https://doi.org/10.15587/2706-5448.2021.229539

Keywords:

information and telecommunication system, information security system, security policy, method of formal proof of security, specification language

Abstract

The object of research is the information and telecommunication system (ITS) and ensuring the protection of information stored, processed and circulating in it. One of the most problematic areas in the creation of secure ITS is the logical inconsistency and incompleteness of the information security policy. That is, a set of laws, rules, restrictions, recommendations, etc., which regulate the procedure for processing information and are aimed at protecting information from a certain set of threats. The reason for such problems is usually the absence of pre-design modeling of the information security system as a component of the information and telecommunications system, which in the end causes the latter to be vulnerable.

An important prerequisite for the creation of a secure ITS is the construction of a subject-object model of the system, which makes it possible to determine the connections between objects, their features, to model information flows and types of access to information and infrastructure resources. According to the existing clear, complete and consistent subject-object model of the ITS, it becomes possible to apply mathematical methods to modeling the processes of its functioning, including for solving the problem of formal proof of security.

The paper considers the main idea of the method of formal proof of security, which can be used when building information security systems or assessing the security of the created information and telecommunications system. It is shown that for its implementation it is possible to use the methodology of automatic theorem proving. One of the ways to solve this problem, which is proposed in the work, is the use of the PVS (Prototype Verification System) formal logic system, which is widely used for writing specifications and constructing proofs. The main components of this system are considered, as well as the possibilities of its use for automatic proof of statements about the impossibility of unauthorized access under the conditions of a certain security policy. An example of the use of the PVS system for the formal proof of the security of the system in the framework of the Bella-LaPadula security policy is given.

Author Biographies

Victor Zhora, Institute of Software Systems of National Academy of Science of Ukraine

Junior Researcher

Research department No. 11 «Automated Information Systems»

Oleksandr Synetskyi, Institute of Software Systems of National Academy of Science of Ukraine

Postgraduate Student

References

  1. Antoniuk, A. A., Zhora, V. V. (2005). Obobshchenye modely uhroz v ynformatsyonno-telekommunykatsyonnoi systeme. Pravove, normatyvne ta metrolohichne zabezpechennia systemy zakhystu informatsii v Ukraini, 11, 50–54.
  2. Glushkov, V. M. (1980). Sistema avtomatizatsii dokazatelstv. Avtomatizatsiia obrabotki matematicheskikh tekstov. Kyiv: IK AN USSR, 3–30.
  3. Bishop, M. (2018). Computer Security Art and Science. Addison Wesley Professional, 2865.
  4. Owre, S., Shankar, N., Rushby, J. M., Stringer-Calvert, D. W. J. (2020). PVS System Guide Version 7.1. SRI International. Available at: https://pvs.csl.sri.com/doc/pvs-system-guide.pdf
  5. Owre, S., Shankar, N. Rushby, J. M., Stringer-Calvert, D. W. J. (2020). PVS Language Reference Version 7.1. SRI International. Available at: https://pvs.csl.sri.com/doc/pvs-language-reference.pdf
  6. Owre, S., Shankar, N., Rushby, J. M., Stringer-Calvert, D. W. J. (2020). PVS Prover Guide Version 7.1. SRI International. Available at: https://pvs.csl.sri.com/doc/pvs-prover-guide.pdf
  7. Antoniuk, A. O., Zhora, V. V. (2007). Vikoristannia dokazovogo metodu dlia proektuvannia ta otsіnki rіvnia zakhischenostі іnformatsіino-telekomunіkatsіinoї sistemi. Problemi programuvannia, 3, 88–96.
  8. Muñoz, C. A., Demasi, R. A.; Meyer, B., Nordio, M. (Eds.) (2012). Advanced Theorem Proving Techniques in PVS and Applications. Tools for Practical Software Verification. LASER 2011. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, 7682. doi: http://doi.org/10.1007/978-3-642-35746-6_4
  9. McGuinness, D. L.; Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., Patel-Schneider, P. F. (Eds.) (2010). The Description Logic Handbook. Theory, Implementation and Applications. Cambridge: University Press, 624. doi: http://doi.org/10.1017/cbo9780511711787
  10. Turhan, A. Y.; Rudolph, S., Gottlob, G., Horrocks, I., van Harmelen, F. (Eds.) (2013). Introductions to Description Logics – A Guided Tour. Reasoning Web. Semantic Technologies for Intelligent Data Access. Reasoning Web 2013. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, 8067. doi: http://doi.org/10.1007/978-3-642-39784-4_3
  11. Bell, D. E., La Padula, L. J. (1976). Secure Computer Systems: Mathematical foundations and model. Report ESD-TR-73-278. Mitre Corp. Bedford. Available at: http://www-personal.umich.edu/~cja/LPS12b/refs/belllapadula1.pdf

Downloads

Published

2021-04-30

How to Cite

Zhora, V., & Synetskyi, O. (2021). Use of the PVS formal logic system in the method of formal proof of security in the construction of information security systems. Technology Audit and Production Reserves, 2(2(58), 41–45. https://doi.org/10.15587/2706-5448.2021.229539

Issue

Section

Systems and Control Processes: Reports on Research Projects