A Survey on Zero Trust Architecture: Challenges and Future Trends

被引:59
作者
He, Yuanhang [1 ]
Huang, Daochao [2 ]
Chen, Lei [1 ]
Ni, Yi [1 ]
Ma, Xiangjie [1 ]
机构
[1] China Elect Technol Grp Corp, Res Inst 30, Chengdu, Peoples R China
[2] Natl Comp Network Emergency Response Tech Team Co, Beijing 100029, Peoples R China
关键词
CONTINUOUS AUTHENTICATION; ENABLED INTERNET; ACCESS-CONTROL; SECURITY; THINGS; DTLS;
D O I
10.1155/2022/6476274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional perimeter-based network protection model cannot adapt to the development of current technology. Zero trust is a new type of network security model, which is based on the concept of never trust and always verify. Whether the access subject is in the internal network or the external network, it needs to be authenticated to access resources. The zero trust model has received extensive attention in research and practice because it can meet the new network security requirements. However, the application of zero trust is still in its infancy, and enterprises, organizations, and individuals are not fully aware of the advantages and disadvantages of zero trust, which greatly hinders the application of zero trust. This paper introduces the existing zero trust architecture and analyzes the core technologies including identity authentication, access control, and trust assessment, which are mainly relied on in the zero trust architecture. The main solutions under each technology are compared and analyzed to summarize the advantages and disadvantages, as well as the current challenges and future research trends. Our goal is to provide support for the research and application of future zero trust architectures.
引用
收藏
页数:13
相关论文
共 54 条
[11]  
da Silva G. R., 2021, P AN 21 S BRAS SEG I, P43, DOI [10.5753/sbseg.2021.17305, DOI 10.5753/SBSEG.2021.17305]
[12]  
de Weever Catherine, 2020, Zero trust network security model in containerized environments
[13]   Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication [J].
DeCusatis, Casimer ;
Liengtiraphan, Piradon ;
Sager, Anthony ;
Pinelli, Mark .
2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, :5-10
[14]   Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing [J].
Ehatisham-ul-Haq, Muhammad ;
Azam, Muhammad Awais ;
Naeem, Usman ;
Amin, Yasar ;
Loo, Jonathan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 :24-35
[15]  
[房梁 Fang Liang], 2017, [计算机学报, Chinese Journal of Computers], V40, P1680
[16]   A credible and lightweight multidimensional trust evaluation mechanism for service-oriented IoT edge computing environment [J].
Gao, Zhipeng ;
Zhao, Wensi ;
Xia, Chenxi ;
Xiao, Kaile ;
Mo, Zijia ;
Wang, Qian ;
Yang, Yang .
2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019), 2019, :156-164
[17]  
Ghate N., 2021, IEICE Proceedings Series, V68
[18]   Untraceable Sensor Movement in Distributed IoT Infrastructure [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE SENSORS JOURNAL, 2015, 15 (09) :5340-5348
[19]   Decentralized Trust Evaluation in Vehicular Internet of Things [J].
Guleng, Siri ;
Wu, Celimuge ;
Chen, Xianfu ;
Wang, Xiaoyan ;
Yoshinaga, Tsutomu ;
Ji, Yusheng .
IEEE ACCESS, 2019, 7 :15980-15988
[20]  
Hatakeyama K, 2021, 2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), P514, DOI [10.1109/PerComWorkshops51409.2021.9431116, 10.1109/PERCOMWORKSHOPS51409.2021.9431116]