Abstract
With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving security issues such as telecommuting based on Zero Trust architecture become a focus of attention. The core of a Zero Trust architecture is “continuous verification, never trust”, which means that by default, both internal and external personnel, terminals, and businesses are considered untrustworthy, and their access to the network and business resources will be continuously verified and evaluated. The paper first expounds the historical evolution, basic characteristics, and key technologies of Zero Trust, and then proposes a telecommuting security solution based on Zero Trust architecture. The solution can effectively solve problems such as identity trustworthiness discrimination, device trustworthiness discrimination and behavior trustworthiness discrimination, to achieve secure and reliable business access for telecommuting workers and intelligent terminals. The solution has reference significance for further optimization and implementation of Zero Trust framework in relevant application scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shaw, K.: What is zero trust network architecture (ZTNA)?. Network World (Online) (2022)
Singh, J., Refaey, A., Koilpillai, J.: Adoption of the software-defined perimeter (SDP) architecture for infrastructure as a service. Can. J. Electr. Comput. Eng. 43(4), 357–363 (2020)
Hao, P.: He Yuanwen. Research and application of network security architecture based on zero trust Guangdong communication technology 02, 63–67 (2022)
Minlu, T., Meng, R.: Research on zero trust security system. Inf. Secur. Commun. Confident. 10, 124–132 (2022)
Xiaohai, C., Xiaohua, Y., Yanling, L.: Design of remote office security solutions in the context of the epidemic. Guangdong Commun. Technol. 43(01), 20–23+31 (2023)
Tao, Z., Jian, G., Zhen, L., Xuan, Z.: Design of a security gateway based on zero trust architecture. Netw. Secur. Technol. Appl. (06), 2–4 (2023)
Dawei, L., Enzhun, Z., Ming, L., Chunxiao, S.: Zero Trust in edge computing environment: a blockchain based practical scheme. Math. Biosci. Engin.: MBE 19(4), 4196–4216 (2022)
Haiqing, L., Ming, A., Rong, H., Rixuan, Q., Yuancheng, L.: Identity authentication for edge devices based on zero‐trust architecture. Concurrency Comput.: Practic. Experi. 34(23) (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kou, W., Zhou, H., Du, J. (2024). Research on Telecommuting Security Solution Based on Zero Trust Architecture. In: Zhang, Y., Qi, L., Liu, Q., Yin, G., Liu, X. (eds) Proceedings of the 13th International Conference on Computer Engineering and Networks. CENet 2023. Lecture Notes in Electrical Engineering, vol 1127. Springer, Singapore. https://doi.org/10.1007/978-981-99-9247-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-99-9247-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9246-1
Online ISBN: 978-981-99-9247-8
eBook Packages: EngineeringEngineering (R0)