HOME JOURNALS CONTACT

Information Technology Journal

Year: 2008 | Volume: 7 | Issue: 1 | Page No.: 228-230
DOI: 10.3923/itj.2008.228.230
Modeling Non-Repudiation in Distributed Systems
Hong Zheng, Yu Yue Du and Yu ShuXia

Abstract: As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security services. The study applies labeled colored Petri nets to modeling and analysis of the non-repudiation in distributed environment.

Fulltext PDF Fulltext HTML

How to cite this article
Hong Zheng, Yu Yue Du and Yu ShuXia, 2008. Modeling Non-Repudiation in Distributed Systems. Information Technology Journal, 7: 228-230.

Keywords: Petri nets, Distributed system, non-repudiation and security service

INTRODUCTION

In distributed systems, communication between the parties is notoriously insecure, transferred data could be eavesdropped or worse still tampered with by an attacker. The limited trust between the partners leads to the need for a system that provides non-repudiation to compensate for the lack of trust between different companies across trust boundaries (Anonymous, 2002). This study focuses on the provision of a formal model of non-repudiation service.

NON-REPUDIATION MODEL OF AN ELECTRONIC BUSINESS APPLICATION

The non-repudiation service is required to provide the evidence generation, evidence collection, evidence verification, evidence storage and evidence retrieval.

A non-repudiation model for electronic business systems is provided as shown in Fig. 1. We assume client Amy (a buyer) is communicating with an online store server (a seller) and wishes to make a purchase. The seller authenticates to ensure the buyer is not an impostor.

FORMAL ANALYSIS OF NON-REPUDIATION SERVICES

Over the past few years, formal methods have been successfully applied to the analysis of system security.

Fig. 1: A non-repudiation service model

Since the bulk of the effort has been concerned with authentication and confidentiality properties, there are now a range of maturing techniques and approaches for such analysis, as exemplified by Boleslaw and Sachin (2004) and Hong and Li (2002). By contrast, non-repudiation has not been addressed to the same degree by these techniques. Petri nets are widely used in various application domains because of its simplicity and strong expressive and analytic power of system behavior (Wiebke, 2005; Boleslaw and Sachin, 2005). The study discusses how Petri nets extend or adapt to the analysis of non-repudiation.

Labeled Colored Petri Net (LCPN): Formally, a Petri net (PN) is a 3-triple PN = (P,T;F), where P is a finite set of places represented by circles, T a finite set of transitions represented by bars or rectangles and P∩T = φ, F⊆(PxT)∪(TxP) a set of arcs. In this sub-section, a labeled colored Petri net is defined to model and analyze the non-repudiation service based on Fig. 1.

Definition 1: A Labeled Colored Petri Net (LCPN) is a 4-tuple LCPN = (CPN, M0, Ω, l), where

The CPN is a colored Petri net (Du and Jiang, 2004), CPN = (Σ, P, T, A, N, C, G, E, I), where P = PC∪PD∪PI, PC is a finite set of control places, PD is a finite set of data places and PI is a finite set of interface places. Let Ip = PC ∪ PD
T is a finite set of transitions, P∩T=φ. T=Tin∪Tout∪Tint, Tin∩Tout = φ, Tin∩Tint = φ, Titn∩Tout = φ. Where Tin is a finite set of receiving message transitions, which are represented to receive other participant messages from interface places, Tout is a finite set of sending message transitions, which are represented to send message to other participants from interface places. Tint is a finite set of internal transitions that represent internal actions of a participant regardless of other participants.
M = (MC, MD, MI): P→{0, 1} is a marking function. MC, MD and MI represent respectively the marking at the set of PC, PD and PI. M0 = (MC0, MD0, MI0) is an initial marking. Let IM = (MC, MD)
l: T→Ω is a labeled function. The labeled function is used to map transitions related the same task to a symbol or map internal transitions to an invisible action represented by τ.

Definition 2: Enabling and firing rules:

Let (CPN, M0, Ω, l) be an LCPN, LCPN = (CPN, M0, Ω, l), M = (MC, MD, MI) ∈ (M0), such that step Y in the LCPN is said to be enabled at IM if only and if (t,p)∈YE(p,t)≤M(p). If step Y is enabled at IM, step Y is firable. After Y is fired, a new marking is generated, namely, IM[Y>IM′=(MC′, MD′), where

∀p∈IP, IM′(p) = IM(p)- ∑(t,b)∈YE(p,t)+∑(t,b)∈YE(t,p).

Non-repudiation service models: In Fig. 2, pc11 and pc12 are two control places, Pc = {pc11, pc12, pc21, pc22}. Similarly, pd11, pd12, pd21, pd22 and pd13 are data places. pri_key place is named for readability. A set of interface places is PI, PI = {pi1, pi2, pi3}. The place pri_key is used to deposit Amy`s private key. Amy`s public key is deposited in pub_key place. The token color is order which represents Amy`s order form, k is Amy`s private key, k(order) represents Amy`s encrypted (by her private key signature) order form, c is a color set of control tokens.

Fig. 2: Non-repudiation service model of a whole B-S business

M0 is initial a marking, M0(pc11) = 1, M0 (pri_key) = 1, M0 (pc21) = 1, M0 (pub_key) = 1. Transition fill_order is an internal transition that represents Amy fills her order form, transition cryp_order is also an internal transition that represents Amy makes a digital signature by her private key and these two transitions can be mapped to a symbol τ. Transition send_order is a sending message transition used to send the order data to the seller, rece_no is a receiving message transition used to receive the refused message by this seller, the seller uses rece_yes to receive the affirmed message. Tokeas no and yes describe respectively the refused and the affirmed message. Transition send_no denotes the seller sends invalid message to buyer Amy and send_yes is used to represent valid message to the buyer. encr_order and chec_order are two internal transitions mapped to a symbol τ. According to the net structure in Fig. 2, the liveness of the whole B-S business LCPN model is easily proved.

NON-REPUDIATION EVIDENCE

In this study we use LCPNs to analyze evidence generation and collection of non-repudiation service. In contrast to authentication, security auditing and other services, the non-repudiation service is not concerned with communication issues between participants. By using the identity and/or other privilege attributes of the distributed object, the security authorization and access control are provided. The distributed system basic security services can be implemented by security technologies and mechanisms. So we focus on evidence issues of non-repudiation by LCPNs.

With respect to this business system, we only provide formal models with a buyer and a seller. Actually, this system should contain bank or other corresponding entities. For the sake of simplification, we do not consider these details. If each participant strictly performs his own obligation and task in the trading, both the buyer and the seller will reach their respective aims, that is, the buyer can get her shopping goods and the seller get payments for goods. According to the two models of Fig. 2, the following propositions can put forward in terms of their firing steps.

Proposition 1: If there exists a firing step σ from an initial marking M0 and M0(pc11) = 1, M0(pri_key) = 1, such that σ = τsend_order. Therefore, any third party can prove the buyer has sent his order in terms of the step σ and the message transferred to place pi1, that is, non-repudiation sending order of the buyer can be provided.

Proposition 2: If there exists a firing step σ from an initial marking M0 and M0(pc21) = 1, M0(pub_key) = 1, M0(pi1 = 1), such that σ = τsend_orderrece_order. Therefore, one trusted third party could judge the seller has received the buyer`s order in terms of σ and the message deposited in place pi1, that is, the non-repudiation of receiving order of the seller can be provided.

Proposition 3: If there exists a firing step σ, σ = τsend-orderrece_order, the seller is responsible to firing his internal transitions and other sending transitions, otherwise, both the buyer and the seller cannot reach their own aims.

Proposition 4: The firing step σ, σ = τsend-orderrece_orderτ send_yesrece_yes, means that the business affair has been performed successfully. If there exists a firing step σ, σ = τsend-orderrece_order τsend_no rece_no, one trusted third party can use the firing step σ and message data deposited in place pi2 to prove no goods is provides to the buyer.

The non-repudiation service describes the functionality of the service, but implement details of such a service have not been addressed. Formally modeling and analyzing non-repudiation evidence by the LCPN method in the study helps to implement the non-repudiation service in distributed applications.

ACKNOWLEDGMENTS

This research is supported by the National High Technology Research and Development Program of P.R. China (No. 2002AA412610); the National Natural Science Foundation of China under Grants 60773034 and 60573018; Taishan Scholar Construction Project of Shandong Province, China; the National Basic Research Program of China (973 Program) under Grants 2003CB316902 and 2004CB318001-03; the Open Project of the State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences under Grant SYSKF0604 and the Research foundation of East China University of Science and Technology. The authors are also grateful to the anonymous referees for their insightful and valuable comments and suggestions.

REFERENCES

  • Anonymous, 2002. Deployment and configuration of component-based distributed applications. OMG Document: orbos/2002-01-19.


  • Boleslaw, M. and J. Sachin, 2004. Modeling of information systems security features with colored Petri nets. Proceedings of the International Conference on Systems, Man and Cybernetics, October 10-13, 2004, The Hague, Netherlands, pp: 4879-4884.


  • Boleslaw, M. and J. Sachin, 2005. Specifying selected security features of interorganizational workflows. Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and Intelligent Agents, Web Technologies and Internet Commerce, November 28-30, 2005, Washington, DC., USA., pp: 958-963.


  • Du, Y.Y. and C.J. Jiang, 2004. Verifying functions in online stock trading systems. J. Comput. Sci. Technol., 19: 203-212.
    CrossRef    Direct Link    


  • Wiebke, D., 2005. Security Analysis of the secure authentication protocol by means of coloured Petri nets. Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, September 19-21, 2005, Springer Verlag, pp: 230-239.


  • Zheng, H. and S.X. Li, 2002. The description of CORBA objects based on Petri nets. Proceedings of the 4th International Conference on Formal Engineering Methods, Lecture Notes in Computer Science, October 21-25, 2002, Springer-Verlag, Shanghai, China, pp: 48-56.

  • © Science Alert. All Rights Reserved