Application protection in 5G cloud network using zero trust architecture

Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network archi...

Full description

Saved in:
Bibliographic Details
Main Author: Guofeng HE
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-12-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841528942961360896
author Guofeng HE
author_facet Guofeng HE
author_sort Guofeng HE
collection DOAJ
description Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.
format Article
id doaj-art-730f6eec009f42679a52076baeeb3ff5
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-12-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-730f6eec009f42679a52076baeeb3ff52025-01-15T03:32:19ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-12-013612313259813786Application protection in 5G cloud network using zero trust architectureGuofeng HEBased on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/network securitydynamic access controlapplication hidingzero trust5Gapplication protection
spellingShingle Guofeng HE
Application protection in 5G cloud network using zero trust architecture
Dianxin kexue
network security
dynamic access control
application hiding
zero trust
5G
application protection
title Application protection in 5G cloud network using zero trust architecture
title_full Application protection in 5G cloud network using zero trust architecture
title_fullStr Application protection in 5G cloud network using zero trust architecture
title_full_unstemmed Application protection in 5G cloud network using zero trust architecture
title_short Application protection in 5G cloud network using zero trust architecture
title_sort application protection in 5g cloud network using zero trust architecture
topic network security
dynamic access control
application hiding
zero trust
5G
application protection
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/
work_keys_str_mv AT guofenghe applicationprotectionin5gcloudnetworkusingzerotrustarchitecture