{"title":"基于零信任架构的私有区块链系统","authors":"Yao-Chung Chang, Yu-Shan Lin, Arun Kumar Sangaiahc, Hsin-Te Wu","doi":"10.23919/ICACT60172.2024.10471993","DOIUrl":null,"url":null,"abstract":"During the outbreak of COVID-19, many enterprises massively created Virtual Private Networks (VPNs) for companies to cooperate; however, these accounts lacked efficient management after the epidemic, leading to data leakage or the suffering of malicious attacks. Consequently, several firms have started to build private blockchains for data preservation and verification. Private blockchains are usually built internally in companies; once a firm's internal network opens for massive external logins, many servers and private blockchains cannot work properly to protect data. In general, private blockchains store critical personal information or relevant confidential data; once a private blockchain opens to external access, all the information in the network nodes will be exposed, making private them lose their protection functions. This paper proposes a security mechanism using a private blockchain system based on zero trust architecture. The zero trust architecture tracks every user's network conditions and analyses whether their behaviors are authorized. Additionally, the system utilizes micro-segmentation to divide the private blockchain, preventing the system from malicious attacks. The proposed system employs user multi-factor authentication to identify users, and the zero trust architecture tracks and analyzes if users' behaviors are reasonable. This method effectively ensures corporate networks' security and enables private blockchain to filter legal and authorized users to access and verify.","PeriodicalId":518077,"journal":{"name":"2024 26th International Conference on Advanced Communications Technology (ICACT)","volume":"33 1","pages":"143-146"},"PeriodicalIF":0.0000,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Private Blockchain System based on Zero Trust Architecture\",\"authors\":\"Yao-Chung Chang, Yu-Shan Lin, Arun Kumar Sangaiahc, Hsin-Te Wu\",\"doi\":\"10.23919/ICACT60172.2024.10471993\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"During the outbreak of COVID-19, many enterprises massively created Virtual Private Networks (VPNs) for companies to cooperate; however, these accounts lacked efficient management after the epidemic, leading to data leakage or the suffering of malicious attacks. Consequently, several firms have started to build private blockchains for data preservation and verification. Private blockchains are usually built internally in companies; once a firm's internal network opens for massive external logins, many servers and private blockchains cannot work properly to protect data. In general, private blockchains store critical personal information or relevant confidential data; once a private blockchain opens to external access, all the information in the network nodes will be exposed, making private them lose their protection functions. This paper proposes a security mechanism using a private blockchain system based on zero trust architecture. The zero trust architecture tracks every user's network conditions and analyses whether their behaviors are authorized. Additionally, the system utilizes micro-segmentation to divide the private blockchain, preventing the system from malicious attacks. The proposed system employs user multi-factor authentication to identify users, and the zero trust architecture tracks and analyzes if users' behaviors are reasonable. This method effectively ensures corporate networks' security and enables private blockchain to filter legal and authorized users to access and verify.\",\"PeriodicalId\":518077,\"journal\":{\"name\":\"2024 26th International Conference on Advanced Communications Technology (ICACT)\",\"volume\":\"33 1\",\"pages\":\"143-146\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2024 26th International Conference on Advanced Communications Technology (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICACT60172.2024.10471993\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2024 26th International Conference on Advanced Communications Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT60172.2024.10471993","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Private Blockchain System based on Zero Trust Architecture
During the outbreak of COVID-19, many enterprises massively created Virtual Private Networks (VPNs) for companies to cooperate; however, these accounts lacked efficient management after the epidemic, leading to data leakage or the suffering of malicious attacks. Consequently, several firms have started to build private blockchains for data preservation and verification. Private blockchains are usually built internally in companies; once a firm's internal network opens for massive external logins, many servers and private blockchains cannot work properly to protect data. In general, private blockchains store critical personal information or relevant confidential data; once a private blockchain opens to external access, all the information in the network nodes will be exposed, making private them lose their protection functions. This paper proposes a security mechanism using a private blockchain system based on zero trust architecture. The zero trust architecture tracks every user's network conditions and analyses whether their behaviors are authorized. Additionally, the system utilizes micro-segmentation to divide the private blockchain, preventing the system from malicious attacks. The proposed system employs user multi-factor authentication to identify users, and the zero trust architecture tracks and analyzes if users' behaviors are reasonable. This method effectively ensures corporate networks' security and enables private blockchain to filter legal and authorized users to access and verify.