Skip to main content

Research on Telecommuting Security Solution Based on Zero Trust Architecture

  • Conference paper
  • First Online:
Proceedings of the 13th International Conference on Computer Engineering and Networks (CENet 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1127))

Included in the following conference series:

  • 127 Accesses

Abstract

With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving security issues such as telecommuting based on Zero Trust architecture become a focus of attention. The core of a Zero Trust architecture is “continuous verification, never trust”, which means that by default, both internal and external personnel, terminals, and businesses are considered untrustworthy, and their access to the network and business resources will be continuously verified and evaluated. The paper first expounds the historical evolution, basic characteristics, and key technologies of Zero Trust, and then proposes a telecommuting security solution based on Zero Trust architecture. The solution can effectively solve problems such as identity trustworthiness discrimination, device trustworthiness discrimination and behavior trustworthiness discrimination, to achieve secure and reliable business access for telecommuting workers and intelligent terminals. The solution has reference significance for further optimization and implementation of Zero Trust framework in relevant application scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shaw, K.: What is zero trust network architecture (ZTNA)?. Network World (Online) (2022)

    Google Scholar 

  2. Singh, J., Refaey, A., Koilpillai, J.: Adoption of the software-defined perimeter (SDP) architecture for infrastructure as a service. Can. J. Electr. Comput. Eng. 43(4), 357–363 (2020)

    Article  Google Scholar 

  3. Hao, P.: He Yuanwen. Research and application of network security architecture based on zero trust Guangdong communication technology 02, 63–67 (2022)

    Google Scholar 

  4. Minlu, T., Meng, R.: Research on zero trust security system. Inf. Secur. Commun. Confident. 10, 124–132 (2022)

    Google Scholar 

  5. Xiaohai, C., Xiaohua, Y., Yanling, L.: Design of remote office security solutions in the context of the epidemic. Guangdong Commun. Technol. 43(01), 20–23+31 (2023)

    Google Scholar 

  6. Tao, Z., Jian, G., Zhen, L., Xuan, Z.: Design of a security gateway based on zero trust architecture. Netw. Secur. Technol. Appl. (06), 2–4 (2023)

    Google Scholar 

  7. Dawei, L., Enzhun, Z., Ming, L., Chunxiao, S.: Zero Trust in edge computing environment: a blockchain based practical scheme. Math. Biosci. Engin.: MBE 19(4), 4196–4216 (2022)

    Google Scholar 

  8. Haiqing, L., Ming, A., Rong, H., Rixuan, Q., Yuancheng, L.: Identity authentication for edge devices based on zero‐trust architecture. Concurrency Comput.: Practic. Experi. 34(23) (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wanli Kou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kou, W., Zhou, H., Du, J. (2024). Research on Telecommuting Security Solution Based on Zero Trust Architecture. In: Zhang, Y., Qi, L., Liu, Q., Yin, G., Liu, X. (eds) Proceedings of the 13th International Conference on Computer Engineering and Networks. CENet 2023. Lecture Notes in Electrical Engineering, vol 1127. Springer, Singapore. https://doi.org/10.1007/978-981-99-9247-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9247-8_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9246-1

  • Online ISBN: 978-981-99-9247-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics