Abstract
We study the nature of the relationship between performance measures and privacy guarantees in the case study of an adaptive protocol for the secure transmission of real-time audio over the Internet. The analysis is conducted on a process-algebraic description of the audio mechanism by following a methodology that allows the modeler to (i) employ the noninterference approach to information flow theory for the analysis of security requirements, and (ii) derive performance measures obtained through markovian analysis techniques. The main result we present is that the analysis of performance properties helps to estimate the effectiveness (and to find a related countermove) of an attack that is captured by the security analysis.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aldini, A., Amoroso, A., Roccetti, M.: A Secure Protocol for Voice-Operated E-Commerce Systems over IP Networks. Int. Journal of Pure and Applied Mathematics 4(2), 121–142 (2003)
Aldini, A., Bernardo, M., Gorrieri, R., Roccetti, M.: Comparing the QoS of Internet Audio Mechanisms via Formal Methods. ACM Transactions on Modelling and Computer Simulation 11(1), 1–42 (2001)
Aldini, A., Bravetti, M., Gorrieri, R.: A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. Journal of Computer Security (to appear)
Aldini, A., Gorrieri, R., Roccetti, M.: An Adaptive Mechanism for Realtime Secure Speech Transmission over the Internet. In: Schulzrinne, H. (ed.) 2nd IP-Telephony Workshop (IP-Tel 2001), pp. 64–72 (2001)
Aldini, A., Gorrieri, R., Roccetti, M.: On Securing Real Time Speech Transmission over the Internet: An Experimental Study. EURASIP Journal on Applied Signal Processing, Special Issue on Digital Audio for Multimedia Communications, Hindawi Publishing Corporation (to appear)
Baier, C., Hermanns, H.: Weak Bisimulation for Fully Probabilistic Processes. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 119–130. Springer, Heidelberg (1997)
Bernardo, M.: Theory and Application of Extended Markovian Process Algebra. Ph.D. Thesis, University of Bologna, Italy (1999), ftp://ftp.cs.unibo.it/pub/techreports/
Bernardo, M., Cleaveland, W.R., Sims, S.T., Stewart, W.J.: TwoTowers: A Tool Integrating Functional and Performance Analysis of Concurrent Systems. In: Joint Int. Conf. on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing, and Verification (FORTE-PSTV 1998), pp. 457–467. Kluwer, Dordrecht (1998)
Bernardo, M., Donatiello, L., Gorrieri, R.: A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems. Information and Computation 144, 83–154 (1998)
Beyer, W.H.: Standard Probability & Statistics Tables & Formulae. CRC Press, Boca Raton (1990)
Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, p. 1. Springer, Heidelberg (2001)
Bravetti, M.: Specification and Analysis of Stochastic Real-Time Systems. Ph.D. Thesis, University of Bologna, Italy (2002), ftp://ftp.cs.unibo.it/pub/techreports/
Bravetti, M., Aldini, A.: Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds. Theoretical Computer Science 290(1), 355–406 (2003)
Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security 3(1), 5–33 (1995)
Focardi, R., Gorrieri, R., Martinelli, F.: Non Interference for the Analysis of Cryptographic Protocols. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 354–372. Springer, Heidelberg (2000)
van Glabbeek, R.J., Smolka, S.A., Steffen, B.: Reactive, Generative and Stratified Models of Probabilistic Processes. Information and Computation 121, 59–80 (1995)
Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Symposium on Security and Privacy (SSP 1982), pp. 11–20. IEEE CS Press, Los Alamitos (1982)
Gray III., J.W.: Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1, 255–294 (1992)
Hardman, V., Sasse, M.A., Kouvelas, I.: Successful Multi-Party Audio Communication over the Internet. Communications of the ACM 41, 74–80 (1998), http://www-mice.cs.ucl.ac.uk/multimedia/software/rat/
Harrison, P., Strulo, B.: Stochastic Process Algebra for Discrete Event Simulation. In: Quantitative Methods in Parallel Systems. ESPRIT Basic Research Series, pp. 18–37. Springer, Heidelberg (1995)
Hermanns, H., Herzog, U., Hillston, J., Mertsiotakis, V., Rettelbach, M.: Stochastic Process Algebras: Integrating Qualitative and Quantitative Modelling. In: 7th Conf. on Formal Description Techniques (FORTE 1994), pp. 449–451. Chapman & Hall, Boca Raton (1994)
McLean, J.: Security Models and Information Flow. In: IEEE Symposium on Research in Security and Privacy, pp. 180-189 (1990)
Milner, R.: Communication and Concurrency. Prentice Hall, Englewood Cliffs (1989)
Roccetti, M., Ghini, V., Pau, G., Salomoni, P., Bonfigli, M.E.: Design and Experimental Evaluation of an Adaptive Playout Delay Control Mechanism for Packetized Audio for Use over the Internet. Multimedia Tools and Appl., an Int. Journal 14(1), 23–53 (2001)
Ryan, P.Y.A., McLean, J., Millen, J., Gligor, V.: Non-interference: who needs it? In: 14th Computer Security Foundations Workshop (CSFW 2001), pp. 237–238. IEEE CS Press, Los Alamitos (2001)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
Schulzrinne, H.: Voice Communication across the Internet: a Network Voice Terminal. Tech. Rep., University of Massachusetts, Amherst (MA) (1992), http://www.cs.columbia.edu/~hgs/rtp/nevot.html
Steinmetz, R., Dittman, J., Steinebach, M. (eds.): Communications and Multimedia Security Issues of the New Century. Kluwer Academic Publishers, Dordrecht (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aldini, A., Gorrieri, R. (2003). A Study about Trade-Off between Performance and Security in an Internet Audio Mechanism. In: Priami, C. (eds) Global Computing. Programming Environments, Languages, Security, and Analysis of Systems. GC 2003. Lecture Notes in Computer Science, vol 2874. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40042-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-40042-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20583-8
Online ISBN: 978-3-540-40042-4
eBook Packages: Springer Book Archive