Abstract
Networked self-service terminals (NSST) are intelligent devices that are widely used in various fields. They can provide convenient services and interactions, but they also face various security threats. Traditional security protection models are often based on the division of trust boundaries, treating the internal of the terminal as a trusted area, and the external of the terminal as an untrusted area. However, in the application scenarios of self-service terminals, the concepts of internal and external have become blurred, and the security problems have gradually emerged. The traditional boundary security model can no longer meet their security needs. To solve this problem, a zero-trust model for NSST is proposed. This model is based on the security framework of the NIST zero-trust model, which no longer assumes that any area or component is trustworthy, but instead uses multi-level, multi-dimensional, and dynamic security policies to achieve comprehensive and real-time monitoring and protection of the terminal. On this basis, the characteristics and security requirements of NSST are analyzed, and the overall architecture and core components of the zero-trust model are designed, including identity authentication, access control, data encryption, behavior audit, permission management and other aspects. The protection of NSST is achieved by the collaboration of components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Assunção, P.: A zero trust approach to network security; proceedings of the. 2010 In: Proceedings of the Digital Privacy and Security Conference, F, (2019)
Ward, R., Beyer, B.: Beyondcorp: A new approach to enterprise security (2014)
Kindervag, J.: Build security into your network’s dna: The zero trust network architecture. Forrester Res. Inc. 27 (2010)
Feng, J.Y., Yu, T.T, Wang, Z.Y., et al.: Edge ZTM for Resisting the Threat of Lost Terminals in Power IoT Scenarios. Comput. Res. Dev. (2022)
Shao, L., Niu, W.N., Zhang, X.S.: Self-service terminal network security threat assessment and response in IoT application scenarios. J. Sichuan Univ. Nat. Sci. Ed. 60(1), 11 (2023)
Hu, Z.: Network and Information Security. Tsinghua University (2006)
NIST has released the second draft of SP 1800–35: Implementing a Zero Trust Architecture. Inf. Technol. Standard. (1): 1 (2023)
Wang, S.L., Feng, X., Cai, Y.B, et al.: Analysis and application of Zero trust security model. Inf. Secur. Res. 6(11) (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, B., Ye, H., Chen, J., Xia, Y., Cheng, J. (2024). A Zero Trust Model for Networked Self-Service Terminals. In: Cai, Z., Xiao, M., Zhang, J. (eds) Theoretical Computer Science. NCTCS 2023. Communications in Computer and Information Science, vol 1944. Springer, Singapore. https://doi.org/10.1007/978-981-99-7743-7_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-7743-7_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7742-0
Online ISBN: 978-981-99-7743-7
eBook Packages: Computer ScienceComputer Science (R0)