Skip to main content

Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment

  • Conference paper
  • First Online:
Disruptive Information Technologies for a Smart Society (ICIST 2023)

Abstract

The abilities of traditional perimeter-based security architectures are rapidly decreasing as more enterprise assets are moved toward the cloud environment. From a security viewpoint, the Zero Trust framework can better track and block external attackers while limiting security breaches resulting from insider attacks in the cloud paradigm. Furthermore, Zero Trust can better accomplish access privileges for users and devices across cloud environments to enable the secure sharing of resources. Moreover, the concept of zero trust architecture in cloud computing requires the integration of complex practices on multiple layers of system architecture, as well as a combination of a variety of existing technologies. This paper focuses on authentication mechanisms, calculation of trust score, and generation of policies in order to establish required access control to resources. The main objective is to incorporate an unbiased trust score as a part of policy expressions while preserving the configurability and adaptiveness of parameters of interest. Finally, the proof-of-concept is demonstrated on a micro-cloud platform solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiao, Y., et al.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019)

    Google Scholar 

  2. Furfaro, A., Garro, A., Tundis, A.: Towards security as a service (secaas): on the modeling of security services for cloud computing. In: 2014 International Carnahan Conference on Security Technology (ICCST). IEEE (2014)

    Google Scholar 

  3. Li, X., et al.: Smart applications in edge computing: overview on authentication and data security. IEEE Internet Things J. 8(6), 4063–4080 (2020)

    Google Scholar 

  4. Eldow, A., et al.: Literature review of authentication layer for public cloud computing: a meta-analysis. J. Theoretical Appl. Inf. Technol. 97, 12 (2006)

    Google Scholar 

  5. Shen, C., et al.: User practice in password security: an empirical study of real-life passwords in the wild. Comput. Secur. 61, 130–141 (2016)

    Google Scholar 

  6. Syed, N.F., et al.: Zero trust architecture (zta): A comprehensive survey. IEEE Access (2022)

    Google Scholar 

  7. Mehraj, S., Banday, M.T.: Establishing a zero trust strategy in cloud computing environment. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020, pp. 1–6 (2020). https://doi.org/10.1109/ICCCI48352.2020.9104214

  8. Dimitrakos, T., et al.: Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2020)

    Google Scholar 

  9. Wang, D., Zhang, J.: Multi-source fusion in subjective logic. In: 2017 20th International Conference on Information Fusion (Fusion). IEEE (2017)

    Google Scholar 

  10. OASIS XACML Homepage. https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml. Accessed 23 May 2023

  11. Rose, S., et al.: Zero trust architecture. No. NIST Special Publication (SP) 800-207. National Institute of Standards and Technology (2020)

    Google Scholar 

  12. Babaeizadeh, M., Bakhtiari, M., Mohammed, A.M.: Authentication methods in cloud computing: a survey. Res. J. Appl. Sci. Eng. Technol. 9(8), 655–664 (2015)

    Google Scholar 

  13. Vault Homepage. https://www.vaultproject.io/. Accessed 23 May 2023

  14. Carnley, P.R., Kettani, H.: Identity and access management for the internet of things. Int. J. Future Comput. Commun. 8(4), 129–133 (2019)

    Google Scholar 

  15. Sarkar, S., et al.: Security of zero trust networks in cloud computing: a comparative review. Sustainability 14(18), 11213 (2022)

    Google Scholar 

Download references

Acknowledgment

Funded by the European Union (TaRDIS, 101093006). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union. Neither the European Union nor the granting authority can be held responsible for them.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivana Kovacevic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kovacevic, I., Stojkov, M., Simic, M. (2024). Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment. In: Trajanovic, M., Filipovic, N., Zdravkovic, M. (eds) Disruptive Information Technologies for a Smart Society. ICIST 2023. Lecture Notes in Networks and Systems, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-031-50755-7_45

Download citation

Publish with us

Policies and ethics