{"title":"Secret Protection in Discrete-Event Systems With Generalized Confidentiality Requirements","authors":"Ziyue Ma;Kai Cai","doi":"10.1109/TAC.2024.3481030","DOIUrl":null,"url":null,"abstract":"In this article, we propose a general framework to design optimal secret protection policies in discrete-event systems. The system is modeled by an automaton in which several states are <italic>secret</i> and assigned with different confidentiality requirement. Events in the system can be protected to verify the identity of the user, and a user who successfully executes/passes a protected event gains some authorization. Our purpose is to design an event-protecting policy such that any user, either legal or unauthorized, who visits a secret state must have an authorization that satisfies the requirement of confidentiality of the state. We consider the criteria of optimality on protecting policies as to protecting policies with a minimum degree of disturbance to legal users' normal operations. To this aim, we use Moore machines to model the dynamics of the clearance level of users when using the system. Then, we develop an auxiliary data structure called the <italic>generalized secret automaton</i>, based on which we propose a method to design a protecting policy using the classical supervisory control theory. The minimally disruptive protecting policy is then represented by an automaton called the <italic>secret enforcer</i> whose state size is polynomial both in the number of the plant states and the number of secret states in the plant.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 4","pages":"2321-2333"},"PeriodicalIF":7.0000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10716794/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, we propose a general framework to design optimal secret protection policies in discrete-event systems. The system is modeled by an automaton in which several states are secret and assigned with different confidentiality requirement. Events in the system can be protected to verify the identity of the user, and a user who successfully executes/passes a protected event gains some authorization. Our purpose is to design an event-protecting policy such that any user, either legal or unauthorized, who visits a secret state must have an authorization that satisfies the requirement of confidentiality of the state. We consider the criteria of optimality on protecting policies as to protecting policies with a minimum degree of disturbance to legal users' normal operations. To this aim, we use Moore machines to model the dynamics of the clearance level of users when using the system. Then, we develop an auxiliary data structure called the generalized secret automaton, based on which we propose a method to design a protecting policy using the classical supervisory control theory. The minimally disruptive protecting policy is then represented by an automaton called the secret enforcer whose state size is polynomial both in the number of the plant states and the number of secret states in the plant.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.