A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

被引:10
|
作者
Ali, Belal [1 ]
Hijjawi, Simsam [2 ]
Campbell, Leith H. [1 ]
Gregory, Mark A. [1 ]
Li, Shuo [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic, Australia
[2] Monash Univ, eSolut Cyber Risk & Resilience, Melbourne, Vic, Australia
关键词
PRIVACY; IOT; BLOCKCHAIN;
D O I
10.1155/2022/3178760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network
    Zaid, Bassfar
    Sayeed, Ashar
    Bala, Priti
    Alshehri, Ali
    Alanazi, Abdulaziz Mohammed
    Zubair, Swaleha
    MATHEMATICS, 2023, 11 (12)
  • [22] Zero-Trust Artificial Intelligence?
    Laplante, Phil
    Voas, Jeffrey
    COMPUTER, 2022, 55 (02) : 10 - 12
  • [23] Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV
    Fang, He
    Zhu, Yongxu
    Zhang, Yan
    Wang, Xianbin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (08) : 8760 - 8772
  • [24] Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records
    Benaich R.
    El Mendili S.
    Gahi Y.
    HighTech and Innovation Journal, 2023, 4 (03): : 630 - 652
  • [25] Security and Trust Metrics for Edge Computing
    Acken, John M.
    Sehgal, Naresh K.
    Bansal, Divya
    Bass, Robert B.
    2023 IEEE PES GRID EDGE TECHNOLOGIES CONFERENCE & EXPOSITION, GRID EDGE, 2023,
  • [26] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [27] Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023,
  • [28] Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (12)
  • [29] xG Security: Zero-Trust and Moving Target Defense in Decentralized Learning Environment
    Abdelhay, Zeyad
    Refaey, Ahmed
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1820 - 1825
  • [30] Zero-Trust Communication between Chips
    Belwafi, Kais
    Alshamsi, Hamdan
    Ahmed, Ashfaq
    Shoufan, Abdulhadi
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 27 - 31