Loading…

Zero Trust Security Strategy for Collaboration Systems

Nowadays, society is characterized by a highly mobile population and growing needs in terms of sharing large volumes of sensitive data within companies and collaborating with partner or competitor organizations. As a result, the computer systems of these organizations systems are exposed to various...

Full description

Saved in:
Bibliographic Details
Main Authors: N'goran, Kouadio Rodrigue, Brou, Aguie Pacome Bertr Bertrand, Pandry, Koffi Ghislain, Tetchueng, Jean-Louis, Kermarrec, Yvon, Asseu, Olivier
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, society is characterized by a highly mobile population and growing needs in terms of sharing large volumes of sensitive data within companies and collaborating with partner or competitor organizations. As a result, the computer systems of these organizations systems are exposed to various types of increasingly sophisticated threats and cyber-attacks. Traditional perimeter-based infrastructure security strategies are no longer sufficient. The Zero Trust security model is a cybersecurity approach that considers all entities in an infrastructure as potentially vulnerable at any time and in any place. This strategy is a response to the problem of securing heterogeneous, complex and decentralized systems. However, its implementation varies according to the context of the system, and requires organizational and cultural changes. In this article, we propose a Zero Trust security strategy in the context of collaboration between organizations. The model presents a hierarchical architecture to secure exchanges within and between organizations. It provides a decentralized management system for user and organization identities through decentralized identifiers and a blockchain registry. In addition, the approach suggests a trust inference technique to assess trust between organizations. Furthermore, the proposed framework includes a mechanism for specifying and monitoring collaboration contracts and defining access policy rules. A case study on the deployment of our strategy in a community cloud is also presented.
ISSN:2768-0940
DOI:10.1109/ISNCC58260.2023.10323911