2021
DOI: 10.1007/s00354-021-00130-6
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic

Abstract: The ubiquitous cloud computing services provide a new paradigm to the work-from-home environment adopted by the enterprise in the unprecedented crisis of the COVID-19 outbreak. However, the change in work culture would also increase the chances of the cybersecurity attack, MAC spoofing attack, and DDoS/DoS attack due to the divergent incoming traffic from the untrusted network for accessing the enterprise’s resources. Networks are usually unable to detect spoofing if the intruder already forges the host’s MAC … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 40 publications
0
5
0
2
Order By: Relevance
“…A arquitetura de ZT é uma tendência crescente na área de segurança cibernética, que tem ganhado destaque, em especial após os eventos pandêmicos [14]. A arquitetura ZT se baseia na premissa de que nenhum dispositivo é confiável por padrão e as permissões devem ser avaliadas continuamente.…”
Section: Confiança Zero Em Redes Industriaisunclassified
“…A arquitetura de ZT é uma tendência crescente na área de segurança cibernética, que tem ganhado destaque, em especial após os eventos pandêmicos [14]. A arquitetura ZT se baseia na premissa de que nenhum dispositivo é confiável por padrão e as permissões devem ser avaliadas continuamente.…”
Section: Confiança Zero Em Redes Industriaisunclassified
“…Bentuk referal yang ada di pelanggan sering membuka saluran baru yang mengizinkan penjual untu kberkomunikasi dengan prospek yang sebelumnya tidak dapat dijangkau. Studi menunjukan bahwa ketika hubungan antar perusahaan dan pelanggan kuat, konsumen lebih bersedia untuk melakukan pembelian ulang terhadap penawaran perusahaan dan merekomendasikannya kepada yang lain (Guo et al, 2018); (Mandal et al, 2021). Mempertahankan hubungan pelanggan yang baik dapat meningkatkan kesediaan mereka untuk memberikan referal (Dawes, 2009).…”
Section: Womunclassified
“…However, it does not standardize the format and semantics of the context in ZTF and cannot operate the authorization server and the identifier used when the context cannot be shared. In the same year, Mandal [41] et al proposed a cloud-based zero trust access control strategy by establishing a MAC spoofing defense mechanism in the SDN framework of the cloud architecture to support the work-from-home approach driven by COVID-19. When changes for the access control strategy of the enterprise structure are required, it shows greater accuracy by examining source TCP/IP traffic and corresponding MAC addresses, collecting individual network traffic from untrusted zones.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%