skip to main content
10.1145/3377049.3377114acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
short-paper

Protection of Sensitive Data in Zero Trust Model

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

A novel model is presented in this paper to provide access control to sensitive data in Zero Trust Model (ZTM). In ZTM, there is no default trust for internal or external parties in the network. In this model, it is considered that threat to sensitive data may arise from inside and outside of the militarized zone. Outside locations include internet and cloud across a corporate network. Users from all locations may request access for the sensitive data. An access control proxy is introduced in this model to protect the sensitive data by controlling the access by analyzing access request, user type, device type, application type and data type. Accordingly new policies are implemented in ZTM to protect sensitive data. This model is found very effective in enhancing the security of sensitive data from unauthorized access and manipulation.

References

  1. European Parliament and Council, "Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016Google ScholarGoogle Scholar
  2. Ed Coyne and Timothy R. Weil, ABAC and RBAC: Scalable, Flexible, and Auditable Access, Management IT Pro May/June 2013.Google ScholarGoogle Scholar
  3. Ant, Allan. Technology Overview for Adaptive Access Control, 29 May 2014, Gartner ResearchGoogle ScholarGoogle Scholar
  4. J. Kindervag, No More Chewy Centers: Zero Trust Model of Information Security, March 23, 2016, Forrester Research.Google ScholarGoogle Scholar
  5. J. Kindervag, Build Security Into Your Network's DNA: The Zero Trust Network Architecture, November 5, 2010 Forrester Research.Google ScholarGoogle Scholar
  6. C. Cunninghum and J. Polard. The Eight Business and Security Benefit of Zero Trust, November 1, 2017, Forrester ResearchGoogle ScholarGoogle Scholar
  7. B. Lee, R. Vanickis, F. Rogelios and P. Jacob, "Situation Awarness based Risk Adaptable Access Control in Enterprise Netowrks," in 2nd International Conference on Internet of Things, Big Data and Security (IoTBS), Porto, 2017Google ScholarGoogle Scholar
  8. R Vanickis, P Jacob, S, Dehghanzadeh and B Lee(2018) Access Control Policy enforcement for Zero-Trust Networking, ISSC, Dec 2018 BelfastGoogle ScholarGoogle Scholar
  9. B. Osborn, J Mcwilliams, B Beyer and M. Saltonstall. Google Beyond Corp Design to Deployment, Login, Spring 2016 Vol 4, No 1Google ScholarGoogle Scholar
  10. S. Balaouras, C. Cunningham and P. Cerrato, Five steps of Zero Trust Network, October, 2018, Forrester Research.Google ScholarGoogle Scholar
  11. N. MacDonald, Zero Trust Is an Initial Step on the Roadmap to CARTA, 10 December, 2018, Gartner ResearchGoogle ScholarGoogle Scholar
  12. Vensmer and S. Kiesel, "DynFire: dynamic firewalling in heterogeneous networks," in Proceedings World Congress on Internet Security (WorldCIS), 2012Google ScholarGoogle Scholar
  13. Z. Zaheer, H. Chang, S. Mukherjee, and J. Van der Merwe (2018). eZTrust: Network-Independent Zero-Trust Parameterization for Microservices, SOSR, 19 April 03--04, 2019, San Jose, CA.Google ScholarGoogle Scholar

Index Terms

  1. Protection of Sensitive Data in Zero Trust Model

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCA 2020: Proceedings of the International Conference on Computing Advancements
        January 2020
        517 pages
        ISBN:9781450377782
        DOI:10.1145/3377049

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader