Abstract
The abilities of traditional perimeter-based security architectures are rapidly decreasing as more enterprise assets are moved toward the cloud environment. From a security viewpoint, the Zero Trust framework can better track and block external attackers while limiting security breaches resulting from insider attacks in the cloud paradigm. Furthermore, Zero Trust can better accomplish access privileges for users and devices across cloud environments to enable the secure sharing of resources. Moreover, the concept of zero trust architecture in cloud computing requires the integration of complex practices on multiple layers of system architecture, as well as a combination of a variety of existing technologies. This paper focuses on authentication mechanisms, calculation of trust score, and generation of policies in order to establish required access control to resources. The main objective is to incorporate an unbiased trust score as a part of policy expressions while preserving the configurability and adaptiveness of parameters of interest. Finally, the proof-of-concept is demonstrated on a micro-cloud platform solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiao, Y., et al.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)
Furfaro, A., Garro, A., Tundis, A.: Towards security as a service (secaas): on the modeling of security services for cloud computing. In: 2014 International Carnahan Conference on Security Technology (ICCST). IEEE (2014)
Li, X., et al.: Smart applications in edge computing: overview on authentication and data security. IEEE Internet Things J. 8(6), 4063–4080 (2020)
Eldow, A., et al.: Literature review of authentication layer for public cloud computing: a meta-analysis. J. Theoretical Appl. Inf. Technol. 97, 12 (2006)
Shen, C., et al.: User practice in password security: an empirical study of real-life passwords in the wild. Comput. Secur. 61, 130–141 (2016)
Syed, N.F., et al.: Zero trust architecture (zta): A comprehensive survey. IEEE Access (2022)
Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020, pp. 1–6 (2020). https://doi.org/10.1109/ICCCI48352.2020.9104214
Dimitrakos, T., et al.: Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2020)
Wang, D., Zhang, J.: Multi-source fusion in subjective logic. In: 2017 20th International Conference on Information Fusion (Fusion). IEEE (2017)
OASIS XACML Homepage. https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml. Accessed 23 May 2023
Rose, S., et al.: Zero trust architecture. No. NIST Special Publication (SP) 800-207. National Institute of Standards and Technology (2020)
Babaeizadeh, M., Bakhtiari, M., Mohammed, A.M.: Authentication methods in cloud computing: a survey. Res. J. Appl. Sci. Eng. Technol. 9(8), 655–664 (2015)
Vault Homepage. https://www.vaultproject.io/. Accessed 23 May 2023
Carnley, P.R., Kettani, H.: Identity and access management for the internet of things. Int. J. Future Comput. Commun. 8(4), 129–133 (2019)
Sarkar, S., et al.: Security of zero trust networks in cloud computing: a comparative review. Sustainability 14(18), 11213 (2022)
Acknowledgment
Funded by the European Union (TaRDIS, 101093006). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union. Neither the European Union nor the granting authority can be held responsible for them.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kovacevic, I., Stojkov, M., Simic, M. (2024). Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment. In: Trajanovic, M., Filipovic, N., Zdravkovic, M. (eds) Disruptive Information Technologies for a Smart Society. ICIST 2023. Lecture Notes in Networks and Systems, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-031-50755-7_45
Download citation
DOI: https://doi.org/10.1007/978-3-031-50755-7_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50754-0
Online ISBN: 978-3-031-50755-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)