Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation

被引:1
作者
Cheng, Yexia [1 ,2 ,3 ]
Du, Yuejin [1 ,2 ,4 ]
Peng, Jin [3 ]
Fu, Jun [3 ]
Liu, Baoxu [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] China Mobile Res Inst, Dept Secur Technol, Beijing, Peoples R China
[4] Alibaba Grp, Secur Dept, Beijing, Peoples R China
来源
CYBER SECURITY, CNCERT 2018 | 2019年 / 970卷
基金
中国国家自然科学基金;
关键词
Secure accessing; Cloud-channel-device cooperation; Trust base; Protection framework; Secure connecting; Access control;
D O I
10.1007/978-981-13-6621-5_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of network technologies, such as mobile Internet, Internet of Things (IoT), secure accessing is becoming an important issue. Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue. The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end. Meanwhile, access control based on connection tracking is adopted to reduce access latency. The framework can be used to construct an open, trusted, resilient network for secure accessing and provide security solutions for mobile office, IoT security, information security management and control, etc. The effectiveness of the framework has been proved by its application to the market.
引用
收藏
页码:165 / 176
页数:12
相关论文
共 12 条
[1]  
[Anonymous], 2014, ENV SCI ENG
[2]  
Hong S, 2016, NDSS
[3]   This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy [J].
Hovav, Anat ;
Putri, Frida Ferdani .
PERVASIVE AND MOBILE COMPUTING, 2016, 32 :35-49
[4]   Design of a secure digital recording protection system with network connected devices [J].
Kim, Hyoungshick .
2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, :375-378
[5]   Anonymous Secure Framework in Connected Smart Home Environments [J].
Kumar, Pardeep ;
Braeken, An ;
Gurtov, Andrei ;
Iinatti, Jari ;
Ha, Phuong Hoai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :968-979
[6]   IoT-Cloud collaboration to establish a secure connection for lightweight devices [J].
Park, Jiye ;
Kwon, Hyeokjin ;
Kang, Namhi .
WIRELESS NETWORKS, 2017, 23 (03) :681-692
[7]  
Peng W, 2013, IEEE CONF COMM NETW, P37, DOI 10.1109/CNS.2013.6682690
[8]   SynAPTIC: Secure And Persistent connecTIvity for Containers [J].
Ranjbar, Alireza ;
Komu, Miika ;
Salmela, Patrik ;
Aura, Tuomas .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :262-267
[9]   New security perspectives around BYOD [J].
Scarfo, Antonio .
2012 SEVENTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2012), 2012, :446-451
[10]  
Yeboah-Boateng E.O., 2016, ABS160901821 CORR