Information Flow Models: Overview and Examples

Information flow models are critical for understanding how data flows within a system and ensuring it adheres to security policies. In this article, we explore information flow concepts, including partial ordering, and review four key access control models: Bell-LaPadula, Biba, Chinese Wall, and Clark-Wilson.


Information Flow Policies

At its core, information flow represents the movement of data between entities. Examples include:

  • Read access: Information flows from an object to a subject.
  • Write access: Information flows from a subject to an object.

To formalize information flow, we use partial ordering, which establishes a hierarchy among security levels. Partial ordering has three essential properties:

  1. Reflexivity: Each entity is at least as secure as itself, enabling self-access.
  2. Transitivity: If Entity A can send information to Entity B, and B to C, then A can send information to C.
  3. Antisymmetry: If A can send information to B and vice versa, they must have the same security level.

Key Access Control Models

1. Bell-LaPadula Model (BLP)

The Bell-LaPadula Model focuses on ensuring data confidentiality by restricting information flow.

  • Subjects: Active entities like users or processes.
  • Objects: Passive entities like files or databases.
  • Security Labels: Objects are classified (e.g., Top Secret, Secret, Unclassified), and subjects require corresponding clearances.
Core Security Properties:
  1. Simple Security Property (No Read Up): Prevents subjects from reading data at a higher security level.
  2. Star (*) Property (No Write Down): Prevents subjects from writing data to a lower security level, avoiding data leaks.
  3. Strong Star Property: Subjects can only read/write at their own security level.
  4. Discretionary Access Control: Uses an access control matrix to enforce permissions.

Limitation: BLP only addresses confidentiality and assumes no insider threats or covert channels, making it impractical in dynamic systems.


2. Biba Model

The Biba Model complements Bell-LaPadula by ensuring data integrity instead of confidentiality.

  • Integrity Levels: Represent the trustworthiness of entities. High levels are “clean,” and low levels are “dirty.”
Core Rules:
  1. Simple Integrity Property (No Write Up): Prevents subjects from corrupting higher integrity data.
  2. Star Integrity Property (No Read Down): Subjects cannot be corrupted by data from lower integrity levels.

Limitation: Like BLP, it assumes static security requirements and lacks real-world adaptability.


3. Chinese Wall Model

The Chinese Wall Model enforces conflict-of-interest (CoI) policies, ensuring that users cannot access conflicting data sets. This model dynamically adapts based on user activity.

Key Features:
  1. Dynamic Rules: Users can only access data that does not conflict with previously accessed data.
  2. Separation of Duties: Prevents fraudulent modifications by ensuring that no user has conflicting permissions.

Example:
A financial analyst working on Client A’s accounts cannot access data for Client B if they are competitors.

Use Case: Frequently applied in industries like finance and consulting, where data conflicts are common.


4. Clark-Wilson Model

The Clark-Wilson Model focuses on data integrity in commercial applications by implementing well-formed transactions and separation of duties.

Integrity Goals:
  1. Prevent Unauthorized Modifications: Enforce strict authentication.
  2. Prevent Improper Modifications: Ensure controls restrict authorized users from making invalid changes.
  3. Ensure Consistency: Maintain both internal and external consistency with well-formed transactions.
Core Mechanisms:
  • Subjects interact with objects only through restricted programs that enforce security policies.
  • Separation of duties ensures no single user can compromise the system.

Example: A bank system restricts account updates to predefined functions, such as deposits and withdrawals, reducing the risk of errors or fraud.


Comparing the Models

FeatureBLP ModelBiba ModelChinese Wall ModelClark-Wilson Model
FocusConfidentialityIntegrityConflict-of-Interest PoliciesIntegrity in Commercial Systems
Key RuleNo Read Up, No Write DownNo Write Up, No Read DownDynamic Access Based on ActivityWell-Formed Transactions
Real-World AdaptabilityLimitedLimitedHighHigh
Use CaseMilitary SystemsHigh Integrity SystemsFinancial & Consulting FirmsBanking, Enterprise Systems

Conclusion

Information flow models like Bell-LaPadula, Biba, Chinese Wall, and Clark-Wilson offer distinct methods for managing data security, integrity, and conflict of interest. While BLP and Biba provide theoretical frameworks for static systems, the Chinese Wall and Clark-Wilson models are better suited for dynamic, real-world environments.

Leave a Comment

Your email address will not be published. Required fields are marked *