A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

被引:10
|
作者
Ali, Belal [1 ]
Hijjawi, Simsam [2 ]
Campbell, Leith H. [1 ]
Gregory, Mark A. [1 ]
Li, Shuo [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic, Australia
[2] Monash Univ, eSolut Cyber Risk & Resilience, Melbourne, Vic, Australia
关键词
PRIVACY; IOT; BLOCKCHAIN;
D O I
10.1155/2022/3178760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Blockchain-based Zero Trust on the Edge
    Bicer, Cem
    Murturi, Ilir
    Donta, Praveen Kumar
    Dustdar, Schahram
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 1006 - 1013
  • [42] A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
    Awan, Samia Masood
    Azad, Muhammad Ajmal
    Arshad, Junaid
    Waheed, Urooj
    Sharif, Tahir
    INFORMATION, 2023, 14 (02)
  • [43] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [44] Edge Computing Security Application: Kilic
    Guven, Ebu Yusuf
    Camurcu, Ali Yilmaz
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 248 - 253
  • [45] Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT
    Tang, Yu
    Yan, Jiawen
    Chakraborty, Chinmay
    Sun, Yi
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21187 - 21202
  • [46] A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication
    Wang, Kenian
    Hong, Yuan
    Li, Yue
    Yan, Rui
    Feng, Jingyu
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [47] Congestion-aware multiaccess edge computing collaboration model for 5G
    Salama, Gerges M.
    Ismail, Alshimaa H.
    Soliman, Tarek Abed
    Hamed, Hesham F. A.
    El-Bahnasawy, Nirmeen A.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (12)
  • [48] A Novel Blockchain Framework for Industrial IoT Edge Computing
    Xu, Xuesong
    Zeng, Zhi
    Yang, Shengjie
    Shao, Hongyan
    SENSORS, 2020, 20 (07)
  • [49] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [50] Blockchain Empowered Trustworthy Access Scheme for 6G Zero-trust Vehicular Networks
    Hao Min
    Ye Dongdong
    Yu Rong
    Wang Jingyu
    Liao Jianxin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (09) : 3004 - 3013