DOI QR코드

DOI QR Code

Cloud Security Scheme Based on Blockchain and Zero Trust

블록체인과 제로 트러스트 기반 클라우드 보안 기법

  • In-Hye Na (Division of Computer Engineering, Baek-Seok University) ;
  • Hyeok Kang (Program in Visual Information Processing, Korea University) ;
  • Keun-Ho Lee (Division of Computer Engineering, Baek-Seok University)
  • 나인혜 (백석대학교 컴퓨터공학부) ;
  • 강혁 (고려대학교 영상정보처리협동과정) ;
  • 이근호 (백석대학교 컴퓨터공학부)
  • Received : 2023.01.30
  • Accepted : 2023.02.27
  • Published : 2023.04.30

Abstract

Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

최근 클라우드 컴퓨팅의 수요가 증가하고 자택근무 및 외부 업무로 인한 원격접속의 증가했다. 또한 외부 공격자의 접근뿐만이 아니라 내부 직원의 업무 접속과 같은 내부에서의 접근을 경계해야 할 필요성이 증가함과 동시에 다양한 공격 기법들이 고도화되는 현 상황에서 그에 맞는 새로운 보안 패러다임이 요구된다. 이로 인해 모든 것을 의심하고 신뢰하지 않는다는 핵심 원칙을 가진 제로 트러스트(Zero-Trust)를 적용한 네트워크 보안 모델이 보안업계에서 주목받기 시작했다. 제로 트러스트 보안은 모든 네트워크를 감시하고 접근을 허용 받기 위해선 먼저 인증을 받아야 하며 접근 요청자에 대한 최소한의 접근 권한을 부여함으로써 보안성을 높인다. 본 논문에서는 제로 트러스트와 제로 트러스트 아키텍처에 대해 설명하고, 제로 트러스트와 블록체인을 이용하여 기존 보안 시스템의 한계점을 극복하고 다양한 기업에서 활용할 수 있고 접근제어 강화를 위한 새로운 클라우드 보안 체계를 제안하고자 한다.

Keywords

Acknowledgement

본 논문은 2020년도 정부(교육부)의 재원으로 한국연구재단의 지원을 받아 수행된 기초연구사업임 (NRF-2020R1I1A3069008)

References

  1. J. H. Lee and H. Y. Kwon, "A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments" The Journal of Korea Institute Of Information Security And Cryptology, vol. 29, no. 4, pp. 847-857, Aug. 2019.
  2. S. Bal, C. Cun, and P. Cer, "Five Steps To A Zero Trust Network : Zero Trust Is The Blueprint For Your Security Architecture" Forrester Research Report, Oct. 2018.
  3. Y. J. Jeon, "Security and Trust on Non-Contact Financial Transaction", Digital Convergence Journal, Vol.19, No.7, pp.147-154, 2021.07.
  4. Cisco, "Cisco Duo Security Zero Trust Solution for User and Device Security", CISCO systems Korea Ltd, Seoul, 2020
  5. S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, 2020.
  6. S. Y. Kim, K. H. Jeong, Y. N. Hwang, and D. H. Nyang, "Abnormal Behavior Detection for Zero Trust Security Model Using Deep Learning" Korea Information Processing Society Collection of academic papers, Vol.28, No.1, pp.132-135, 2021.
  7. J. Y Chun, Zero trust basis of network security strategy, IDG Summary AKAMAI MEGAZONE, 2021.
  8. A. Kerman, O. Borchert, S. Rose, and A. Tan, Implementing a zero trust architecture, The MITRE Corporation, Tech. Rep, 2020.
  9. M. J. Hwang, Microsoft Zero Trust Network Strategy and Implementation Plan, Microsoft Cyber Security Solutions Group, 2020.
  10. R. Vanickis, P. Jacob, S. Dehghanzadeh, and B. Lee, "Access Control Policy Enforcement for Zero-Trust-Networking" 2018 29th Irish Signals and Systems Conference (ISSC), pp.1-6, 2018.
  11. R. Riccardo and M. Repetto, "Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model" Future Generation Computer Systems, Vol.85, pp.235-249, 2018. https://doi.org/10.1016/j.future.2018.04.007
  12. H. B. Chang, "A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident" Convergence security journal, Vol.15 No.7, pp.39-45, 2015
  13. G. Anil, "A Zero-Trust Security Framework for Granular Insight on Blind Spot and Comprehensive Device Protection in the Enterprise of Internet of Things (E-IOT)" BMS Institute of Technology, 2021.
  14. K. D. Uttecht, "Zero Trust (ZT) Concepts for Federal Government Architectures" Massachusetts inst of tech lexington United States, 2020.
  15. Chou, T. S. "Security threats on cloud computing vulnerabilities" International Journal of Computer Science & Information Technology, pp. 79-88, 2013.