2023
DOI: 10.1016/j.jisa.2022.103389
|View full text |Cite
|
Sign up to set email alerts
|

Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The norm has become reactive networks with low accountability and monitoring. Emerging technologies, such as Zero Trust network architecture, have changed the way cloud network security is approached [ 45 ]. No entity, regardless of origin or access scope, is implicitly trusted in ZT network access.…”
Section: Comparative Analysis Of Zero Trust Network Systemmentioning
confidence: 99%
“…The norm has become reactive networks with low accountability and monitoring. Emerging technologies, such as Zero Trust network architecture, have changed the way cloud network security is approached [ 45 ]. No entity, regardless of origin or access scope, is implicitly trusted in ZT network access.…”
Section: Comparative Analysis Of Zero Trust Network Systemmentioning
confidence: 99%
“…Subsequently, scholars began to expand on this logical architecture by incorporating concepts such as policy information points (PIP) and policy storage (Buck et al 2021). Based on existing research (Teerakanok et al 2021;Rose et al 2020), the updated zero trust logic architecture and it key components are summarized in Fig. 2, which includes six major components: network participants, PEP, policy decision points (PDP), PIP, policy administration points (PAP), and resources.…”
Section: Zero Trust Architecturementioning
confidence: 99%
“…The NIST has released the final version of its publication, "Special Publication (SP) 800-207, Zero Trust Architecture" (Rose et al 2020). This document highlights the security concept of zero trust and introduces three technologies, known as "SIM", to implement this architecture.…”
Section: Zero Trust Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Several future trends and innovations are expected to shape the landscape of cybersecurity. Zero Trust is a security model that assumes no implicit trust and verifies everyone and everything trying to connect to the network, regardless of location (Saleem, Warsi, and Islam, 2023). With the increasing complexity of networks and the rise of remote work, Zero Trust architectures provide enhanced security by continuously validating user and device identities.…”
Section: Future Trends and Innovationsmentioning
confidence: 99%