Zero-Trust Model of Cybersecurity: A Significant Challenge in the Future

被引:0
作者
Al-Ayed, Fadi [1 ]
机构
[1] Catholic Univ Amer, Dept Elect Engn & Comp Sci, Washington, DC 20064 USA
来源
2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021) | 2021年
关键词
Access Control; Cybersecurity; Data Protection; Multi-Factor Authentication; Zero-Trust Model; AUTHENTICATION;
D O I
10.1109/CSCI54926.2021.00200
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To address future cybersecurity challenges, this paper proposes a real-time three-factor authentication scheme (RT3FA). The proposed model integrates the characteristics of multi-factor authentication and real-time actual information. The additional layer of protection raises the obstacles for data access; face biometric is needed in addition to two-factor authentication. Facial biometric is accomplished by synchronizing real-time information with feature recognition via an instantaneous live feed from the user's camera. However, the improved protection may cause efficiency issues and thus, require higher capacities for both the user's device and the database system.
引用
收藏
页码:852 / 854
页数:3
相关论文
共 12 条
[1]  
BISSADA A, 2017, MOBILE MULTIFACTOR A, P210
[2]  
Crossman MA, 2016, 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST)
[3]   Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication [J].
DeCusatis, Casimer ;
Liengtiraphan, Piradon ;
Sager, Anthony ;
Pinelli, Mark .
2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, :5-10
[4]  
Fujita Y., 2019, 2019 20 AS PAC NETW, P2019
[5]  
Liu Z., IEEE ACCESS, V8
[6]  
Mihailescu MI, 2020, 2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), P139, DOI [10.1109/COMM48946.2020.9141956, 10.1109/comm48946.2020.9141956]
[7]  
Nair Srijit, 2019, 2019 4th International Conference on Information Systems and Computer Networks (ISCON), P17, DOI 10.1109/ISCON47742.2019.9036225
[8]   Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications [J].
Ometov, Aleksandr ;
Petrov, Vitaly ;
Bezzateev, Sergey ;
Andreev, Sergey ;
Koucheryavy, Yevgeni ;
Gerla, Mario .
IEEE NETWORK, 2019, 33 (02) :82-88
[9]   Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication [J].
Shah, Syed W. ;
Syed, Naeem F. ;
Shaghaghi, Arash ;
Anwar, Adnan ;
Baig, Zubair ;
Doss, Robin .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1120-1127
[10]  
SHEIKH TU, 2019, P 18 IEEE INT C MACH, P1130