Survivable zero trust for cloud computing environments

被引:26
作者
Ferretti, Luca [1 ]
Magnanini, Federico [2 ]
Andreolini, Mauro [1 ]
Colajanni, Michele [3 ]
机构
[1] Univ Modena & Reggio Emilia, Dept Phys Informat & Math, Modena, Italy
[2] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, Modena, Italy
[3] Univ Bologna, Dept Informat Sci & Engn, Bologna, Italy
关键词
Zero trust; Survivability; Distributed systems; Access control; Security; FAULT-TOLERANCE; AUTHENTICATION; SYSTEM;
D O I
10.1016/j.cose.2021.102419
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security model relying on the traditional defense of the perimeter cannot protect modern dynamic organizations. The emerging paradigm called zero trust proposes a modern alternative that enforces access control on every request and avoids implicit trust based on the physical location of people and devices. These architectures rely on several trusted components, but existing proposals make the unrealistic assumption that attackers cannot compromise some of them. We overcome these assumptions and present a novel survivable zero trust architecture that can guarantee the necessary security level for cloud computing environments. The proposed architecture guarantees a high level of security and robustness and under specific conditions it can tolerate intrusions and can recover from failures and successful attacks. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:18
相关论文
共 52 条
  • [1] Agrawal S, 2018, INT CONF COMPUT
  • [2] Trading of Cloud of Things Resources
    Alrawahi, Ahmed Salim
    Lee, Kevin
    Lotfi, Ahmad
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [3] Amir Y., 2018, NETWORK ATTACK RESIL
  • [4] Prime: Byzantine Replication under Attack
    Amir, Yair
    Coan, Brian
    Kirsch, Jonathan
    Lane, John
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 564 - 577
  • [5] [Anonymous], 1995, Software Fault Tolerance
  • [6] [Anonymous], 2013, eXtensible Access Control Markup language (XACML) version 3.0
  • [7] Detection and Threat Prioritization of Pivoting Attacks in Large Networks
    Apruzzese, Giovanni
    Pierazzi, Fabio
    Colajanni, Michele
    Marchetti, Mirco
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 404 - 415
  • [8] Ardagna C.A., 2009, P 1 ACM WORKSH INF S, P49
  • [9] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [10] SERIALIZABILITY THEORY FOR REPLICATED DATABASES
    BERNSTEIN, PA
    GOODMAN, N
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1985, 31 (03) : 355 - 374