Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust

被引:8
作者
Chen, Lu [1 ,2 ]
Dai, Zaojian [1 ,2 ]
Chen, Mu [1 ,2 ]
Li, Nige [1 ,2 ]
机构
[1] Global Energy Interconnect Res Inst, Inst Informat & Commun, Nanjing 210003, Jiangsu, Peoples R China
[2] State Grid Key Lab Informat & Network Secur, Nanjing 210003, Jiangsu, Peoples R China
来源
2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021) | 2021年
关键词
Zero Trust; Power Mobile Interconnection; Security Protection; Dynamic Access Control; Continuous Trust Evaluation;
D O I
10.1109/ICSGEA53208.2021.00021
中图分类号
学科分类号
摘要
Under the background of increasingly severe security situation, the new working mode of power mobile internet business anytime and anywhere has greatly increased the complexity of network interaction. At the same time, various means of breaking through the boundary protection and moving laterally are emerging in an endless stream. The existing boundary-based mobility The security protection architecture is difficult to effectively respond to the current complex and diverse network attacks and threats, and faces actual combat challenges. This article first analyzes the security risks faced by the existing power mobile Internet services, and conducts a collaborative analysis of the key points of zero-trust based security protection from multiple perspectives such as users, terminals, and applications; on this basis, from identity security authentication, continuous trust evaluation, and fine-grained access The dimension of control, fine-grained access control based on identity trust, and the design of a zero-trust-based power mobile interconnection business security protection framework to provide theoretical guidance for power mobile business security protection.
引用
收藏
页码:65 / 68
页数:4
相关论文
共 13 条
[1]  
[Anonymous], 2012, SECURITY 12
[2]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[3]  
Gao P, 2019, PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), P1772, DOI [10.1109/itaic.2019.8785603, 10.1109/ITAIC.2019.8785603]
[4]  
Gilman Evan, 2019, ZERO TRUST NETWORKS, P1
[5]  
Hornyack P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P639
[6]  
LIU Huan, 2020, COMMUNICATIONS TECHN, V53, P1745
[7]   Establishing a Zero Trust Strategy in Cloud Computing Environment [J].
Mehraj, Saima ;
Banday, M. Tariq .
2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, :248-+
[8]   "Andromaly": a behavioral malware detection framework for android devices [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval ;
Glezer, Chanan ;
Weiss, Yael .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) :161-190
[9]   Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method [J].
Shabtai, Asaf ;
Kanonov, Uri ;
Elovici, Yuval .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (08) :1524-1537
[10]  
Ward Rory, 2017, B BEYER CORP NEW APP