
as access control lists, firewalls, and cryptography.
Nevertheless, all these techniques do not guarantee
the propagation of information. The control of infor-
mation propagation is supported by Information Flow
Control (IFC) (Myers and Liskov, 1997). IFC allows
the providers to track and control the propagation of
data to a fine granularity throughout the system using
the security labels that represent the data security lev-
els. In fact, IFC aims to assign a certain category to a
data in terms of:
• Confidentiality: The value of secret information
should not be assigned to a public variable.
• Integrity: Only users who are authorized can
modify the data content.
To control the flow of data, IFC tends to classify data
into different security levels. Generally, this tech-
nique assigns two classes to classify data: one class
for public information with a low security level L
(Low), and another class for secret information with
a high level of security H (High). If we consider that
class H is more restrictive than class L, then the al-
lowed flows are: from L to L, from L to H and from
H to H. The flow from H to L is not allowed because
it will disclose the secret information of class H.
In this paper, our main contributions are as fol-
lows:
• We propose an approach based on IFC. In this ap-
proach, we present a new program level model
based on a security policy which defines the for-
mal specification of the security requirements for
the interference problem.
• We propose an algorithm which checks whether a
given non-interference policy is satisfied or not.
• We suggest that services are published in a ser-
vice repository and the access is ensured through
the Service Oriented Architecture (SOA) im-
plemented as an application-specific blockchain
(cosmos (Kwon and Buchman, 2019)).
• We extend the SOA architecture by adding a new
module to verify the non-interference security re-
quirements.
The rest of the paper is organized as follows. In
section 2, we review the related literature. In section
3, we formally define a security policy model for the
SOA . Our motivated scenario is presented in section
4. In section 5, we present our extended SOA archi-
tecture and explain how the non-interference security
mechanism is applied. In section 6, we provide the
simulation results. We conclude the paper with a sum-
mary and some future work in section 7.
2 RELATED WORK
The IoT faces the challenge of security, which consti-
tutes research problems (Issa et al., 2023), (Siwakoti
et al., 2023). We find a variety of solutions depend-
ing on the context and the IoT application problem
(Sadeghi-Niaraki, 2023). In this paper, we present
some work focusing especially on data sharing in IoT
applications based on the blockchain (Mathur et al.,
2023), (Shari and Malip, 2022). Based on the de-
centralization property of the blockchain, researchers
have proposed a lot of data processing methods to pre-
serve personal information.
Xie et al. (Xie et al., 2023) put forward a TEE-
and-blockchain-supported data sharing system for the
IoT. In fact, the consortium blockchain was used to
secure user communications based on access control.
Moreover, the TEE applied the Intel SGX to build
SDSS for reducing the storage pressure and to guar-
antee the security of the off-chain data.
Si et al.(Si et al., 2019) suggested a lightweight in-
formation sharing security mechanism to protect the
source data collection and information transactions.
The data blockchain used a consensus mechanism to
form data books to prevent human tampering or de-
struction of collected data. Besides, the chain utilized
a distributed accounting system to achieve tamper re-
sistance and traceability of bills.
Liu et al.(Liu et al., 2022) proposed a new solu-
tion for blockchain-enabled information sharing. This
solution guaranteed anonymity, entity authentication,
data privacy, data trustworthiness, participant stimu-
lation and fairness in a zero-trust context. It could
also detect and filter fabricated information through
effective voting, smart contracts and consensus mech-
anisms. These mechanisms aimed to penalize and
blacklist unauthenticated participants from sharing
garbage information.
Luo et al.(Luo et al., 2019) put forward a
new accountable data sharing scheme based on the
blockchain and SGX. The proposed schema did not
require a trusted third party as the records of users’
data sharing acts were tamper-resistant. Furthermore,
the confidentiality of data sharing was ensured by
SGX.
Cha et al. (Cha et al., 2021) suggested an ap-
proach based on both the blockchain and the cloud
for protecting and securing secret personal informa-
tion. To secure the data of users from the cloud Ser-
vice Provider (SP), the authors used a secret disper-
sion algorithm to recover the original data even if a
particular cloud SP modulated or lost the data and to
verify the integrity of data stored by the cloud SP.
Cecchetti et al.(Cecchetti et al., 2020) suggested
ICSOFT 2024 - 19th International Conference on Software Technologies
532