{"title":"面向5G工业MEC应用访问控制的双层零信任架构","authors":"Zebing Feng, Peng Zhou, Qi Wang, Weiqiang Qi","doi":"10.1109/ICEICT55736.2022.9908891","DOIUrl":null,"url":null,"abstract":"This paper introduces a dual-layer zero trust architecture (ZTA) to enhance 5G vertical industry multi-access edge computing (MEC) application (APP) access control security. In the dual-layer ZTA, zero trust policy engine is deployed at the 5G core network, which evaluates the trust value of a UE to access to the MEC APP service. User's 5G network layer behavior and industry application layer behavior are jointly evaluated at the policy engine. Protocol interactive procedures are designed to realize the proposed framework in a real 3GPP-defined 5G network. The 5G network exposure function and open interfaces are leveraged to realize the mobile operator and vertical industry dual-layer cooperation. Moreover, behavior entropy is proposed to quantitatively evaluate user trust value and access control matrix under multiple user behavior attributes. The performance evaluation shows that the proposed scheme can effectively eliminate the MEC illegal access issues for user devices access to different MEC APPs and services belonging to a number of industry customers.","PeriodicalId":179327,"journal":{"name":"2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Dual-layer Zero Trust Architecture for 5G Industry MEC Applications Access Control\",\"authors\":\"Zebing Feng, Peng Zhou, Qi Wang, Weiqiang Qi\",\"doi\":\"10.1109/ICEICT55736.2022.9908891\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a dual-layer zero trust architecture (ZTA) to enhance 5G vertical industry multi-access edge computing (MEC) application (APP) access control security. In the dual-layer ZTA, zero trust policy engine is deployed at the 5G core network, which evaluates the trust value of a UE to access to the MEC APP service. User's 5G network layer behavior and industry application layer behavior are jointly evaluated at the policy engine. Protocol interactive procedures are designed to realize the proposed framework in a real 3GPP-defined 5G network. The 5G network exposure function and open interfaces are leveraged to realize the mobile operator and vertical industry dual-layer cooperation. Moreover, behavior entropy is proposed to quantitatively evaluate user trust value and access control matrix under multiple user behavior attributes. The performance evaluation shows that the proposed scheme can effectively eliminate the MEC illegal access issues for user devices access to different MEC APPs and services belonging to a number of industry customers.\",\"PeriodicalId\":179327,\"journal\":{\"name\":\"2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEICT55736.2022.9908891\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEICT55736.2022.9908891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Dual-layer Zero Trust Architecture for 5G Industry MEC Applications Access Control
This paper introduces a dual-layer zero trust architecture (ZTA) to enhance 5G vertical industry multi-access edge computing (MEC) application (APP) access control security. In the dual-layer ZTA, zero trust policy engine is deployed at the 5G core network, which evaluates the trust value of a UE to access to the MEC APP service. User's 5G network layer behavior and industry application layer behavior are jointly evaluated at the policy engine. Protocol interactive procedures are designed to realize the proposed framework in a real 3GPP-defined 5G network. The 5G network exposure function and open interfaces are leveraged to realize the mobile operator and vertical industry dual-layer cooperation. Moreover, behavior entropy is proposed to quantitatively evaluate user trust value and access control matrix under multiple user behavior attributes. The performance evaluation shows that the proposed scheme can effectively eliminate the MEC illegal access issues for user devices access to different MEC APPs and services belonging to a number of industry customers.