Skip to main content

2024 | OriginalPaper | Buchkapitel

Research on Telecommuting Security Solution Based on Zero Trust Architecture

verfasst von : Wanli Kou, Huaizhe Zhou, Jia Du

Erschienen in: Proceedings of the 13th International Conference on Computer Engineering and Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving security issues such as telecommuting based on Zero Trust architecture become a focus of attention. The core of a Zero Trust architecture is “continuous verification, never trust”, which means that by default, both internal and external personnel, terminals, and businesses are considered untrustworthy, and their access to the network and business resources will be continuously verified and evaluated. The paper first expounds the historical evolution, basic characteristics, and key technologies of Zero Trust, and then proposes a telecommuting security solution based on Zero Trust architecture. The solution can effectively solve problems such as identity trustworthiness discrimination, device trustworthiness discrimination and behavior trustworthiness discrimination, to achieve secure and reliable business access for telecommuting workers and intelligent terminals. The solution has reference significance for further optimization and implementation of Zero Trust framework in relevant application scenarios.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shaw, K.: What is zero trust network architecture (ZTNA)?. Network World (Online) (2022) Shaw, K.: What is zero trust network architecture (ZTNA)?. Network World (Online) (2022)
2.
Zurück zum Zitat Singh, J., Refaey, A., Koilpillai, J.: Adoption of the software-defined perimeter (SDP) architecture for infrastructure as a service. Can. J. Electr. Comput. Eng. 43(4), 357–363 (2020)CrossRef Singh, J., Refaey, A., Koilpillai, J.: Adoption of the software-defined perimeter (SDP) architecture for infrastructure as a service. Can. J. Electr. Comput. Eng. 43(4), 357–363 (2020)CrossRef
3.
Zurück zum Zitat Hao, P.: He Yuanwen. Research and application of network security architecture based on zero trust Guangdong communication technology 02, 63–67 (2022) Hao, P.: He Yuanwen. Research and application of network security architecture based on zero trust Guangdong communication technology 02, 63–67 (2022)
4.
Zurück zum Zitat Minlu, T., Meng, R.: Research on zero trust security system. Inf. Secur. Commun. Confident. 10, 124–132 (2022) Minlu, T., Meng, R.: Research on zero trust security system. Inf. Secur. Commun. Confident. 10, 124–132 (2022)
5.
Zurück zum Zitat Xiaohai, C., Xiaohua, Y., Yanling, L.: Design of remote office security solutions in the context of the epidemic. Guangdong Commun. Technol. 43(01), 20–23+31 (2023) Xiaohai, C., Xiaohua, Y., Yanling, L.: Design of remote office security solutions in the context of the epidemic. Guangdong Commun. Technol. 43(01), 20–23+31 (2023)
6.
Zurück zum Zitat Tao, Z., Jian, G., Zhen, L., Xuan, Z.: Design of a security gateway based on zero trust architecture. Netw. Secur. Technol. Appl. (06), 2–4 (2023) Tao, Z., Jian, G., Zhen, L., Xuan, Z.: Design of a security gateway based on zero trust architecture. Netw. Secur. Technol. Appl. (06), 2–4 (2023)
7.
Zurück zum Zitat Dawei, L., Enzhun, Z., Ming, L., Chunxiao, S.: Zero Trust in edge computing environment: a blockchain based practical scheme. Math. Biosci. Engin.: MBE 19(4), 4196–4216 (2022) Dawei, L., Enzhun, Z., Ming, L., Chunxiao, S.: Zero Trust in edge computing environment: a blockchain based practical scheme. Math. Biosci. Engin.: MBE 19(4), 4196–4216 (2022)
8.
Zurück zum Zitat Haiqing, L., Ming, A., Rong, H., Rixuan, Q., Yuancheng, L.: Identity authentication for edge devices based on zero‐trust architecture. Concurrency Comput.: Practic. Experi. 34(23) (2022) Haiqing, L., Ming, A., Rong, H., Rixuan, Q., Yuancheng, L.: Identity authentication for edge devices based on zero‐trust architecture. Concurrency Comput.: Practic. Experi. 34(23) (2022)
Metadaten
Titel
Research on Telecommuting Security Solution Based on Zero Trust Architecture
verfasst von
Wanli Kou
Huaizhe Zhou
Jia Du
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9247-8_9