Application protection in 5G cloud network using zero trust architecture
Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network archi...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841528942961360896 |
---|---|
author | Guofeng HE |
author_facet | Guofeng HE |
author_sort | Guofeng HE |
collection | DOAJ |
description | Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety. |
format | Article |
id | doaj-art-730f6eec009f42679a52076baeeb3ff5 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-12-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-730f6eec009f42679a52076baeeb3ff52025-01-15T03:32:19ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-12-013612313259813786Application protection in 5G cloud network using zero trust architectureGuofeng HEBased on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/network securitydynamic access controlapplication hidingzero trust5Gapplication protection |
spellingShingle | Guofeng HE Application protection in 5G cloud network using zero trust architecture Dianxin kexue network security dynamic access control application hiding zero trust 5G application protection |
title | Application protection in 5G cloud network using zero trust architecture |
title_full | Application protection in 5G cloud network using zero trust architecture |
title_fullStr | Application protection in 5G cloud network using zero trust architecture |
title_full_unstemmed | Application protection in 5G cloud network using zero trust architecture |
title_short | Application protection in 5G cloud network using zero trust architecture |
title_sort | application protection in 5g cloud network using zero trust architecture |
topic | network security dynamic access control application hiding zero trust 5G application protection |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/ |
work_keys_str_mv | AT guofenghe applicationprotectionin5gcloudnetworkusingzerotrustarchitecture |