A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

被引:10
|
作者
Ali, Belal [1 ]
Hijjawi, Simsam [2 ]
Campbell, Leith H. [1 ]
Gregory, Mark A. [1 ]
Li, Shuo [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic, Australia
[2] Monash Univ, eSolut Cyber Risk & Resilience, Melbourne, Vic, Australia
关键词
PRIVACY; IOT; BLOCKCHAIN;
D O I
10.1155/2022/3178760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework
    Alwakeel, Ahmed M.
    Alnaim, Abdulrahman K.
    SENSORS, 2024, 24 (13)
  • [32] A social qualitative trust framework for Fog computing?
    Hamza, Mahnoor
    Iqbal, Waseem
    Ahmad, Awais
    Babar, Muhammad
    Khan, Sohaib
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [33] How BlockChain Can Help Enhance The Security And Privacy in Edge Computing?
    Song, Jinyue
    Gu, Tianbo
    Mohapatra, Prasant
    2021 ACM/IEEE 6TH SYMPOSIUM ON EDGE COMPUTING (SEC 2021), 2021, : 448 - 453
  • [34] Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey
    Liao, Zhuofan
    Pang, Xiang
    Zhang, Jingyu
    Xiong, Bing
    Wang, Jin
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1159 - 1175
  • [35] ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT
    Han, Chenchen
    Kim, Gwang-Jun
    Alfarraj, Osama
    Tolba, Amr
    Ren, Yongjun
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 289 - 295
  • [36] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [37] A Learning-Based Zero-Trust Architecture for 6G and Future Networks
    Enright, Michael A.
    Hammad, Eman
    Dutta, Ashutosh
    2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022, : 64 - 71
  • [38] Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust
    Sirohi, Preeti
    Agarwal, Amit
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 115 - 118
  • [39] Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey
    Singh, Shivani
    Sulthana, Razia
    Shewale, Tanvi
    Chamola, Vinay
    Benslimane, Abderrahim
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01): : 236 - 260
  • [40] Edge Computing for the Metaverse: Balancing Security and Privacy Concerns
    Asad, Muhammad
    Otoum, Safa
    Al Fandi, Omar
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 38 - 45