Skip to main content

A Study about Trade-Off between Performance and Security in an Internet Audio Mechanism

  • Conference paper
Global Computing. Programming Environments, Languages, Security, and Analysis of Systems (GC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2874))

Included in the following conference series:

Abstract

We study the nature of the relationship between performance measures and privacy guarantees in the case study of an adaptive protocol for the secure transmission of real-time audio over the Internet. The analysis is conducted on a process-algebraic description of the audio mechanism by following a methodology that allows the modeler to (i) employ the noninterference approach to information flow theory for the analysis of security requirements, and (ii) derive performance measures obtained through markovian analysis techniques. The main result we present is that the analysis of performance properties helps to estimate the effectiveness (and to find a related countermove) of an attack that is captured by the security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aldini, A., Amoroso, A., Roccetti, M.: A Secure Protocol for Voice-Operated E-Commerce Systems over IP Networks. Int. Journal of Pure and Applied Mathematics 4(2), 121–142 (2003)

    MATH  MathSciNet  Google Scholar 

  2. Aldini, A., Bernardo, M., Gorrieri, R., Roccetti, M.: Comparing the QoS of Internet Audio Mechanisms via Formal Methods. ACM Transactions on Modelling and Computer Simulation 11(1), 1–42 (2001)

    Article  Google Scholar 

  3. Aldini, A., Bravetti, M., Gorrieri, R.: A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. Journal of Computer Security (to appear)

    Google Scholar 

  4. Aldini, A., Gorrieri, R., Roccetti, M.: An Adaptive Mechanism for Realtime Secure Speech Transmission over the Internet. In: Schulzrinne, H. (ed.) 2nd IP-Telephony Workshop (IP-Tel 2001), pp. 64–72 (2001)

    Google Scholar 

  5. Aldini, A., Gorrieri, R., Roccetti, M.: On Securing Real Time Speech Transmission over the Internet: An Experimental Study. EURASIP Journal on Applied Signal Processing, Special Issue on Digital Audio for Multimedia Communications, Hindawi Publishing Corporation (to appear)

    Google Scholar 

  6. Baier, C., Hermanns, H.: Weak Bisimulation for Fully Probabilistic Processes. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 119–130. Springer, Heidelberg (1997)

    Google Scholar 

  7. Bernardo, M.: Theory and Application of Extended Markovian Process Algebra. Ph.D. Thesis, University of Bologna, Italy (1999), ftp://ftp.cs.unibo.it/pub/techreports/

  8. Bernardo, M., Cleaveland, W.R., Sims, S.T., Stewart, W.J.: TwoTowers: A Tool Integrating Functional and Performance Analysis of Concurrent Systems. In: Joint Int. Conf. on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing, and Verification (FORTE-PSTV 1998), pp. 457–467. Kluwer, Dordrecht (1998)

    Google Scholar 

  9. Bernardo, M., Donatiello, L., Gorrieri, R.: A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems. Information and Computation 144, 83–154 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  10. Beyer, W.H.: Standard Probability & Statistics Tables & Formulae. CRC Press, Boca Raton (1990)

    Google Scholar 

  11. Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, p. 1. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Bravetti, M.: Specification and Analysis of Stochastic Real-Time Systems. Ph.D. Thesis, University of Bologna, Italy (2002), ftp://ftp.cs.unibo.it/pub/techreports/

  13. Bravetti, M., Aldini, A.: Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds. Theoretical Computer Science 290(1), 355–406 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  14. Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security 3(1), 5–33 (1995)

    Google Scholar 

  15. Focardi, R., Gorrieri, R., Martinelli, F.: Non Interference for the Analysis of Cryptographic Protocols. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 354–372. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  16. van Glabbeek, R.J., Smolka, S.A., Steffen, B.: Reactive, Generative and Stratified Models of Probabilistic Processes. Information and Computation 121, 59–80 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  17. Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Symposium on Security and Privacy (SSP 1982), pp. 11–20. IEEE CS Press, Los Alamitos (1982)

    Google Scholar 

  18. Gray III., J.W.: Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1, 255–294 (1992)

    Google Scholar 

  19. Hardman, V., Sasse, M.A., Kouvelas, I.: Successful Multi-Party Audio Communication over the Internet. Communications of the ACM 41, 74–80 (1998), http://www-mice.cs.ucl.ac.uk/multimedia/software/rat/

    Article  Google Scholar 

  20. Harrison, P., Strulo, B.: Stochastic Process Algebra for Discrete Event Simulation. In: Quantitative Methods in Parallel Systems. ESPRIT Basic Research Series, pp. 18–37. Springer, Heidelberg (1995)

    Google Scholar 

  21. Hermanns, H., Herzog, U., Hillston, J., Mertsiotakis, V., Rettelbach, M.: Stochastic Process Algebras: Integrating Qualitative and Quantitative Modelling. In: 7th Conf. on Formal Description Techniques (FORTE 1994), pp. 449–451. Chapman & Hall, Boca Raton (1994)

    Google Scholar 

  22. McLean, J.: Security Models and Information Flow. In: IEEE Symposium on Research in Security and Privacy, pp. 180-189 (1990)

    Google Scholar 

  23. Milner, R.: Communication and Concurrency. Prentice Hall, Englewood Cliffs (1989)

    MATH  Google Scholar 

  24. Roccetti, M., Ghini, V., Pau, G., Salomoni, P., Bonfigli, M.E.: Design and Experimental Evaluation of an Adaptive Playout Delay Control Mechanism for Packetized Audio for Use over the Internet. Multimedia Tools and Appl., an Int. Journal 14(1), 23–53 (2001)

    Article  MATH  Google Scholar 

  25. Ryan, P.Y.A., McLean, J., Millen, J., Gligor, V.: Non-interference: who needs it? In: 14th Computer Security Foundations Workshop (CSFW 2001), pp. 237–238. IEEE CS Press, Los Alamitos (2001)

    Chapter  Google Scholar 

  26. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  27. Schulzrinne, H.: Voice Communication across the Internet: a Network Voice Terminal. Tech. Rep., University of Massachusetts, Amherst (MA) (1992), http://www.cs.columbia.edu/~hgs/rtp/nevot.html

  28. Steinmetz, R., Dittman, J., Steinebach, M. (eds.): Communications and Multimedia Security Issues of the New Century. Kluwer Academic Publishers, Dordrecht (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aldini, A., Gorrieri, R. (2003). A Study about Trade-Off between Performance and Security in an Internet Audio Mechanism. In: Priami, C. (eds) Global Computing. Programming Environments, Languages, Security, and Analysis of Systems. GC 2003. Lecture Notes in Computer Science, vol 2874. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40042-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40042-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20583-8

  • Online ISBN: 978-3-540-40042-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics