Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust

被引:8
|
作者
Chen, Lu [1 ,2 ]
Dai, Zaojian [1 ,2 ]
Chen, Mu [1 ,2 ]
Li, Nige [1 ,2 ]
机构
[1] Global Energy Interconnect Res Inst, Inst Informat & Commun, Nanjing 210003, Jiangsu, Peoples R China
[2] State Grid Key Lab Informat & Network Secur, Nanjing 210003, Jiangsu, Peoples R China
关键词
Zero Trust; Power Mobile Interconnection; Security Protection; Dynamic Access Control; Continuous Trust Evaluation;
D O I
10.1109/ICSGEA53208.2021.00021
中图分类号
学科分类号
摘要
Under the background of increasingly severe security situation, the new working mode of power mobile internet business anytime and anywhere has greatly increased the complexity of network interaction. At the same time, various means of breaking through the boundary protection and moving laterally are emerging in an endless stream. The existing boundary-based mobility The security protection architecture is difficult to effectively respond to the current complex and diverse network attacks and threats, and faces actual combat challenges. This article first analyzes the security risks faced by the existing power mobile Internet services, and conducts a collaborative analysis of the key points of zero-trust based security protection from multiple perspectives such as users, terminals, and applications; on this basis, from identity security authentication, continuous trust evaluation, and fine-grained access The dimension of control, fine-grained access control based on identity trust, and the design of a zero-trust-based power mobile interconnection business security protection framework to provide theoretical guidance for power mobile business security protection.
引用
收藏
页码:65 / 68
页数:4
相关论文
共 50 条
  • [1] Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust
    Dai, Zaojian
    Li, Nige
    Li, Yong
    Yuan, Guoquan
    Zhao, Xinjian
    Zhao, Ran
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 507 - 519
  • [2] Power IoT security protection architecture based on zero trust framework
    Zhang Xiaojian
    Chen Liandong
    Jie, Fan
    Wang Xiangqun
    Wang Qi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 166 - 170
  • [3] THE RESEARCH ON SECURITY FRAMEWORK FOR MOBILE INTERNET SERVICES
    Yan, Danfeng
    Wang, Juan
    Yang, Fangchun
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 75 - 79
  • [4] Internet of Things Terminal Access Security Based on Zero Trust
    Qiu, RiXuan
    Zhang, JunFeng
    Chen, Lu
    Li, Wei
    Lin, Nan
    2022 6TH INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, ISCSIC, 2022, : 7 - 11
  • [5] Zero Trust-Based Mobile Network Security Architecture
    Liu, Yiliang
    Su, Zhou
    Peng, Haixia
    Xiang, Yushan
    Wang, Wei
    Li, Ruidong
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 82 - 88
  • [6] Research on Medical Security System Based on Zero Trust
    Wang, Zhiqiang
    Yu, Xinyue
    Xue, Peiyang
    Qu, Yunhan
    Ju, Lei
    SENSORS, 2023, 23 (07)
  • [7] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [8] Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles
    Fang, Letian
    Wu, Chunshang
    Kang, Yukun
    Ou, Wei
    Zhou, Donghao
    Ye, Jun
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] A Cloud Security Framework Based on Trust Model and Mobile Agent
    Benabied, Saddek
    Zitouni, Abdelhafid
    Djoudi, Mahieddine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 1 - 8
  • [10] Research on Security Protection Technology System of Power internet of things
    Gao, Peng
    Yang, Ruxia
    Shi, Congcong
    Zhang, Xiaojian
    PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1772 - 1776