Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture

被引:5
作者
Xu, Mingyang [1 ]
Guo, Junli [2 ]
Yuan, Haoyu [1 ]
Yang, Xinyu [1 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450011, Peoples R China
[2] Zhengzhou Univ, ZHONGYUAN Network Secur Res Inst, Zhengzhou 450011, Peoples R China
关键词
single packet authorization; zero-trust security; endogenous security architecture; authentication security;
D O I
10.3390/electronics12040782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS attacks initiated by known vulnerabilities cannot be prevented, the policy engine based on this control center architecture cannot meet the requirements of system security and reliability. Therefore, it is proposed to apply the SPA single-package authorization and endogenous security architecture to the zero-trust authentication system, which can realize the reliability, dynamism and diversity of system defense. Through the experimental antiattack analysis and antiattack test, the test from the proposed scheme found that when the system introduces the endogenous security architecture, the security of the system can be improved due to the complexity of the attack process and the increase in the cost of the attack. The test through both the security and system overhead found that the scheme can effectively improve the security of the system while ensuring the quality of network services, compared to the traditional scheme. It was found that the scheme can effectively improve the security of the system while ensuring the quality of network services and has better adaptability than the traditional zero-trust authentication scheme.
引用
收藏
页数:21
相关论文
共 38 条
  • [11] Chen X.-Y., 2022, ARXIV
  • [12] DeCusatis C., 2016, 2016 IEEE INT C SMAR
  • [13] Securing IoT Devices Using Zero Trust and Blockchain
    Dhar, Suparna
    Bose, Indranil
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2021, 31 (01) : 18 - 34
  • [14] Access control: principles and solutions
    di Vimercati, SD
    Paraboschi, S
    Samarati, P
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05) : 397 - 421
  • [15] Security boundaries
    Farrell, Stephen
    [J]. IEEE INTERNET COMPUTING, 2008, 12 (01) : 93 - 96
  • [16] Survivable zero trust for cloud computing environments
    Ferretti, Luca
    Magnanini, Federico
    Andreolini, Mauro
    Colajanni, Michele
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [17] Gartner Building Trust with Zero, 2021, TRUST REINV NEW BOUN
  • [18] Gilman E., 2016, USENIX SECURITY
  • [19] Guo J., 2022, P INT S COMPUTER APP, V12250, P192
  • [20] ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT
    Han, Chenchen
    Kim, Gwang-Jun
    Alfarraj, Osama
    Tolba, Amr
    Ren, Yongjun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 289 - 295