{"title":"基于零信任机制的数据访问安全监控系统","authors":"Jianli Han","doi":"10.1117/12.2685667","DOIUrl":null,"url":null,"abstract":"At present, the public data platform lacks high-security certification for its behavior and access, and cannot effectively respond to internal and external threats, which can easily lead to security issues such as network security and data leakage. To this end, this paper designs a data access security monitoring system based on zero trust mechanism. The zero trust system is designed to consist of five components: Trusted Access Console (TAC), Trusted Application Agent (TAP), Trusted API Agent (TIP), Intelligent Identity Analysis System (IDA) and Trusted Environment Awareness System (TESS) . Through quantitative analysis, the security risk perception value of the public data platform is obtained, so as to achieve the purpose of security risk perception of the public data platform. It is proved by experiments that the system has high recognition accuracy and can effectively improve the average access bandwidth of the network.","PeriodicalId":305812,"journal":{"name":"International Conference on Electronic Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data access security monitoring system based on zero trust mechanism\",\"authors\":\"Jianli Han\",\"doi\":\"10.1117/12.2685667\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At present, the public data platform lacks high-security certification for its behavior and access, and cannot effectively respond to internal and external threats, which can easily lead to security issues such as network security and data leakage. To this end, this paper designs a data access security monitoring system based on zero trust mechanism. The zero trust system is designed to consist of five components: Trusted Access Console (TAC), Trusted Application Agent (TAP), Trusted API Agent (TIP), Intelligent Identity Analysis System (IDA) and Trusted Environment Awareness System (TESS) . Through quantitative analysis, the security risk perception value of the public data platform is obtained, so as to achieve the purpose of security risk perception of the public data platform. It is proved by experiments that the system has high recognition accuracy and can effectively improve the average access bandwidth of the network.\",\"PeriodicalId\":305812,\"journal\":{\"name\":\"International Conference on Electronic Information Technology\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electronic Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2685667\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electronic Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2685667","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data access security monitoring system based on zero trust mechanism
At present, the public data platform lacks high-security certification for its behavior and access, and cannot effectively respond to internal and external threats, which can easily lead to security issues such as network security and data leakage. To this end, this paper designs a data access security monitoring system based on zero trust mechanism. The zero trust system is designed to consist of five components: Trusted Access Console (TAC), Trusted Application Agent (TAP), Trusted API Agent (TIP), Intelligent Identity Analysis System (IDA) and Trusted Environment Awareness System (TESS) . Through quantitative analysis, the security risk perception value of the public data platform is obtained, so as to achieve the purpose of security risk perception of the public data platform. It is proved by experiments that the system has high recognition accuracy and can effectively improve the average access bandwidth of the network.