Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3437802.3437824acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccrisConference Proceedingsconference-collections
research-article

Dynamic Access Control and Authorization System based on Zero-trust architecture

Published: 04 January 2021 Publication History

Abstract

With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on border protection cannot meet the increasing security protection requirements. The zero-trust security architecture which has the characteristics of continuous identity authentication and minimized authority allocation can adapt to the security protection requirements of most current network systems. Based on the zero-trust security architecture, a dynamic access control and authorization system is proposed. User portraits and user trust are generated according to user behavior. Real-time hierarchical control in different scenarios is used in the system to achieve dynamic and fine-grained access control and authorization.

References

[1]
Zhou C, Lin Z . Study on fraud detection of telecom industry based on rough set[C]// 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2018.
[2]
Barckay O,Justin M,Betsy B,et al. BeyondCorp design to deploment at Google[EB/OL].(2016-04-21)[2019-10-12]. https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46488.pdf
[3]
Decusatis C, Pinelli M . Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication[C]// IEEE International Conference on Smart Cloud. IEEE, 2016.
[4]
Ward R, Beyer B . Beyondcorp: a new approach to enterprise security[J]. Login the Magazine of Usenix & Sage, 2014, 39:págs. 6-11.
[5]
Cheng Y,Wang F,Shang L, Improved Access Control Strategy Based on RBAC Model and Its Application[C].//Atlantis Press%International Informatization and Engineering Associations.2015.
[6]
Ferraiolo D F, Sandhu R, Gavrila S, Proposed NIST standard for role-based access control[J]. Acm Transactions on Information & System Security, 2001, 4(3):224-274.
[7]
Ben Fadhel A, Bianculli D, Briand L . A Comprehensive Modeling Framework for Role-based Access Control Policies[J]. Journal of Systems & Software, 2015, 107:110-126.
[8]
Feng Y, Ying W . A reputation-based dynamic trust model for large scale distributed environment[J]. Journal of Computational Information Systems, 2013, 9(3):1209-1215.
[9]
Brosso I, Neve A L, Graça Bressan, A Continuous Authentication System Based on User Behavior Analysis[C]// Ares 10 International Conference on Availability. IEEE, 2010.

Cited By

View all
  • (2024)Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic ReviewFuture Internet10.3390/fi1603010616:3(106)Online publication date: 21-Mar-2024
  • (2024)Zero Trust Cybersecurity: Procedures and Considerations in ContextEncyclopedia10.3390/encyclopedia40400994:4(1520-1533)Online publication date: 11-Oct-2024
  • (2024)Enhancing Decentralized Decision-Making with Big Data and Blockchain Technology: A Comprehensive ReviewApplied Sciences10.3390/app1416700714:16(7007)Online publication date: 9-Aug-2024
  • Show More Cited By
  1. Dynamic Access Control and Authorization System based on Zero-trust architecture

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CCRIS '20: Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System
        October 2020
        217 pages
        ISBN:9781450388054
        DOI:10.1145/3437802
        © 2020 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 January 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Access control
        2. Authentication
        3. User trust
        4. Zero trust

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        CCRIS 2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)375
        • Downloads (Last 6 weeks)41
        Reflects downloads up to 13 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic ReviewFuture Internet10.3390/fi1603010616:3(106)Online publication date: 21-Mar-2024
        • (2024)Zero Trust Cybersecurity: Procedures and Considerations in ContextEncyclopedia10.3390/encyclopedia40400994:4(1520-1533)Online publication date: 11-Oct-2024
        • (2024)Enhancing Decentralized Decision-Making with Big Data and Blockchain Technology: A Comprehensive ReviewApplied Sciences10.3390/app1416700714:16(7007)Online publication date: 9-Aug-2024
        • (2024)CYPHONIC-over-QUIC: Secure End-to-End Communication Architecture Traversing Firewalls/NATsJournal of Information Processing10.2197/ipsjjip.32.50932(509-519)Online publication date: 2024
        • (2024)Zero trust-based federated autonomous technology for code repositoryInternational Conference on Computer Network Security and Software Engineering (CNSSE 2024)10.1117/12.3031893(6)Online publication date: 6-Jun-2024
        • (2024)A Risk Adaptive Access Control Model for the Service Mesh Architecture2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI)10.1109/ICMI60790.2024.10585800(1-6)Online publication date: 13-Apr-2024
        • (2024)Ph.D. Project: Systems-on-Chip to Implement Zero-Trust Architectures2024 IEEE 32nd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)10.1109/FCCM60383.2024.00058(249-250)Online publication date: 5-May-2024
        • (2024)Security Mechanisms Used in Systems Based on Zero Trust Architecture: A Systematic Mapping2024 L Latin American Computer Conference (CLEI)10.1109/CLEI64178.2024.10700484(1-10)Online publication date: 12-Aug-2024
        • (2024)Web-Biometrics for User Authenticity Verification in Zero Trust Access ControlIEEE Access10.1109/ACCESS.2024.341369612(129611-129622)Online publication date: 2024
        • (2024)Verify and trust: A multidimensional survey of zero-trust security in the age of IoTInternet of Things10.1016/j.iot.2024.10122727(101227)Online publication date: Oct-2024
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media