A Survey on Zero Trust Architecture: Challenges and Future Trends

被引:59
作者
He, Yuanhang [1 ]
Huang, Daochao [2 ]
Chen, Lei [1 ]
Ni, Yi [1 ]
Ma, Xiangjie [1 ]
机构
[1] China Elect Technol Grp Corp, Res Inst 30, Chengdu, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team Co, Beijing 100029, Peoples R China
关键词
CONTINUOUS AUTHENTICATION; ENABLED INTERNET; ACCESS-CONTROL; SECURITY; THINGS; DTLS;
D O I
10.1155/2022/6476274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional perimeter-based network protection model cannot adapt to the development of current technology. Zero trust is a new type of network security model, which is based on the concept of never trust and always verify. Whether the access subject is in the internal network or the external network, it needs to be authenticated to access resources. The zero trust model has received extensive attention in research and practice because it can meet the new network security requirements. However, the application of zero trust is still in its infancy, and enterprises, organizations, and individuals are not fully aware of the advantages and disadvantages of zero trust, which greatly hinders the application of zero trust. This paper introduces the existing zero trust architecture and analyzes the core technologies including identity authentication, access control, and trust assessment, which are mainly relied on in the zero trust architecture. The main solutions under each technology are compared and analyzed to summarize the advantages and disadvantages, as well as the current challenges and future research trends. Our goal is to provide support for the research and application of future zero trust architectures.
引用
收藏
页数:13
相关论文
共 54 条
[1]   AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors [J].
Abuhamad, Mohammed ;
Abuhmed, Tamer ;
Mohaisen, David ;
Nyang, DaeHun .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :5008-5020
[2]   Augmenting Zero Trust Network Architecture to enhance security in virtual power plants [J].
Alagappan, Annamalai ;
Venkatachary, Sampath Kumar ;
Andrews, Leo John Baptist .
ENERGY REPORTS, 2022, 8 :1309-1320
[3]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[4]   Privacy preserving fine-grained location-based access control for mobile cloud [J].
Baseri, Yaser ;
Hafid, Abdelhakim ;
Cherkaoui, Soumaya .
COMPUTERS & SECURITY, 2018, 73 :249-265
[5]  
Basta N., ZERO TRUST MICROSEGM
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boussard M, 2019, IEEE CONF COMPUT, P841, DOI [10.1109/infcomw.2019.8845126, 10.1109/INFCOMW.2019.8845126]
[8]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057
[9]  
Chuan T., 2020, IMPLEMENTATION METHO, V1651, P1
[10]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)