Open Access Open Access  Restricted Access Subscription Access

Application of Constraint Satisfaction framework to zero trust security Model

Manas Kumar Yogi, Dwarampudi Aiswarya

Abstract


The zero-trust era has dawned with the advent of security models which addresses the gap between established security models. As cyber-security risks are advancing with the various natures of attacks, the threat has to be minimized by application of robust security models based on mathematical foundations. This study attempts to rehash few challenges existing in popular trust computing models and tries to bring out the characteristic features of constraint satisfaction framework to deploy zero security models in ubiquitous computing ecosystems. By applying constraint satisfaction in development of trust models, we represent the trust value to be minimum or which tends to zero-in a secure computing environment. We have arrived at a zero-trust model in such a scenario where the proposed framework proves to induce zero trust. We intend to draw light on the inherent challenges in applying the zero trust models which in future will become a pertinent aspect in secure computing establishments. Be it IoT ecosystem or any other smart environment under the spectrum of Industry 4.0, zero trust models will hold the fort of security in years to come.


Keywords


Security, Attack, Malicious, Constraint, Satisfaction

Full Text:

PDF

References


Tidjon LN, Khomh F. Never trust, always verify: a roadmap for Trustworthy AI? arXiv preprint arXiv: 2206.11981. 2022.

Samaniego Mayra, Ralph Deters. Zero-trust hierarchical management in IoT. 2018 IEEE international congress on Internet of Things (ICIOT). 2018; 88–95.

Da Veiga Adele, et al. Defining organisational information security culture—Perspectives from academia and industry. Comput Secur. 2020; 92: 101713.

Yan Xiangshuai, Huijuan Wang. Survey on zero-trust network security. International Conference on Artificial Intelligence and Security; Singapore: Springer; 2020.

Papakonstantinou Nikolaos, et al. Towards a zero trust hybrid security and safety risk analysis method. International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. Vol. 83983. American Society of Mechanical Engineers. 2020.

Papakonstantinou Nikolaos, et al. A zero trust hybrid security and safety risk analysis method. J Comput Inf Sci Eng. 2021; 21(5): 050907.

Chen Baozhan, et al. A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE Internet Things J. 2020; 8(13): 10248–10263.

Hale Britta, et al. A Zero-Trust Methodology for Security of Complex Systems with Machine Learning Components. International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. Vol. 85376. American Society of Mechanical Engineers. 2021.

Barták Roman, Salido Miguel A, Francesca Rossi. Constraint satisfaction techniques in planning and scheduling. J Intell Manuf. 2010; 21(1): 5–15.

Campbell Earl, Ankur Khurana, Ashley Montanaro. Applying quantum algorithms to constraint satisfaction problems. Quantum. 2019; 3: 167.

Satake Yuki, Hiroshi Unno, Hinata Yanagi. Probabilistic inference for predicate constraint satisfaction. Proceedings of the AAAI Conference on Artificial Intelligence. 2020; 34(02): 1644–51.

Miltzow Tillmann, Schmiermann Reinier F. On classifying continuous constraint satisfaction problems. 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS). 2022; 781–791.

Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Alruban A, Almutairi B, Almotairi S. Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace. Appl Sci. 2022; 12(19): 9736. https://doi.org/10.3390/app12199736.

Nadeem M, Arshad A, Riaz S, Zahra SW, Dutta AK, Almotairi S. Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Appl Sci. 2022; 12(15): 7701. https://doi.org/10.3390/app12157701.

Nadeem M, Arshad A, Riaz S, Band SS, Mosavi A. Intercept the Cloud Network from Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. 2021; 9: 152300–152309. doi: 10.1109/ACCESS.2021.3126535.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517