ABSTRACT
Aiming to strengthen the stability of operation and maintenance of the urban rail transit network cloud platform at this stage, it is emerging to solve the security mechanism of the intelligent urban railway cloud platform. In this paper, we proposed a zero-trust network security solution for the rail transit system network construction. First, we built a zero-trust network construction for smart city rail transit at the architecture level, it can break the phenomenon of information security silo of rail transit line platform and minimize the system security risk based on a zero-trust network. Next, we focus on building a cloud security brain for urban rail transit networks and proposed the self-learning trust algorithm for a zero-trust network. Specifically, we illustrated the modified network model and constructed a dynamic updating user trust profile as the trustworthy access list. The parameters of the self-learning trust algorithm consist of the state, available chain road bandwidth, waiting for queue state of network traffic, linkage actions, and so on. We adopted a dynamic self-learning strategy for adjusting mitigation policy, the learning step predicted the state of the predetermined congestion and selected the rich links for execution. Finally, experiments show the efficiency of our secure mechanism of railway cloud platform based on zero-trust security architecture.
- Baum-Snow N, Kahn M E, Voith R. Effects of urban rail transit expansions: Evidence from sixteen cities, 1970-2000 [with comment][J]. Brookings-Wharton papers on urban affairs, 2005: 147-206.Google Scholar
- Embrey, Bryan. "The top three factors driving zero trust adoption." Computer Fraud & Security 2020.9 (2020): 13-15.Google ScholarCross Ref
- Tu H. Research on the Application of Cloud Computing Technology in Urban Rail Transit[C]//2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE, 2020: 828-831.Google Scholar
- Greenwood D. Applying the principles of zero-trust architecture to protect sensitive and critical data[J]. Network Security, 2021, 2021(6): 7-9.Google ScholarCross Ref
- Mahendra Bhatu Gawali and Subhash K. Shinde, "Standard Deviation Based Modified Cuckoo Optimization Algorithm for Task Scheduling to Efficient Resource Allocation in Cloud Computing," Vol. 8, No. 4, pp. 210-218, November, 2017. doi: 10.12720/jait.8.4.210-218Google Scholar
- Suryakanthi Tangirala, "Efficient Big Data Analytics and Management through the Usage of Cloud Architecture," Vol. 7, No. 4, pp. 302-307, November, 2016. doi: 10.12720/jait.7.4.302-307Google Scholar
- Kindervag, John. "Build security into your network's dna: The zero trust network architecture." Forrester Research Inc (2010): 1-26.Google Scholar
- Stafford V A. Zero-trust architecture[J]. NIST Special Publication, 2020, 800: 207.Google Scholar
- Cunningham C, Emerging Z T P A. The Zero-trust eXtended (ZTX) ecosystem[J]. Forrester, Cambridge, MA, 2018.Google Scholar
- Patil A P, Karkal G, Wadhwa J, Design and Implementation of a Consensus Algorithm to build Zero-trust Model[C]//2020 IEEE 17th India Council International Conference (INDICON). IEEE, 2020: 1-5.Google Scholar
- Collier, Zachary A., and Joseph Sarkis. "The zero trust supply chain: Managing supply chain risk in the absence of trust." International Journal of Production Research (2021): 1-16.Google Scholar
- Mehraj S, Banday M T. Establishing a zero trust strategy in cloud computing environment[C]//2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020: 1-6.Google Scholar
- DeCusatis, Casimer, "Implementing zero trust cloud networks with transport access control and first packet authentication." 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 2016.Google Scholar
- Armin Shams, Hossein Sharif, and Markus Helfert, "A Novel Model for Cloud Computing Analytics and Measurement," Journal of Advances in Information Technology, Vol. 12, No. 2, pp. 93-106, May 2021. doi: 10.12720/jait.12.2.93-106Google ScholarCross Ref
- Rodigari S, O'Shea D, McCarthy P, Performance Analysis of Zero-Trust multi-cloud[C]//2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021: 730-732.Google Scholar
- Xue Z, Xiang M. Data Center Security Protection under Zero-Trust Security Model[J]. Communications Technology, 2017, 50(06): 1290-1294.Google Scholar
- Beck E J. How zero-trust network security can enable recovery from cyberattacks[J]. ISACA Journal, 2014, 6: 14-18.Google Scholar
- Nasif Muslim, Salekul Islam, and Jean-Charles Grégoire, "Reinforcement Learning Based Offloading Framework for Computation Service in the Edge Cloud and Core Cloud," Journal of Advances in Information Technology, Vol. 13, No. 2, pp. 139-146, April 2022Google Scholar
- Lowe R, Wu Y I, Tamar A, Multi-agent actor-critic for mixed cooperative-competitive environments[J]. Advances in neural information processing systems, 2017, 30.Google Scholar
- Yu C, Velu A, Vinitsky E, The Surprising Effectiveness of PPO in Cooperative, Multi-Agent Games[J]. arXiv preprint arXiv:2103.01955, 2021.Google Scholar
Recommendations
Implementation of Cloud-based Urban Rail Big Data Platform
CSAE '22: Proceedings of the 6th International Conference on Computer Science and Application EngineeringFacing the wave of digital transformation of urban rail, it has proposed a cloud-based big data platform construction plan following the innovative urban rail development in the paper. The cloud platform provides virtualized resources and services such ...
Intelligent Railway Systems in China
Chinese R&D in intelligent rail transportation systems is evolving rapidly. Key IRTS subsystems include a client service system and a train control and dispatching system. A key national Chinese laboratory is also studying rail traffic control and ...
Design of Intelligent Parking System Based on Internet of Things and Cloud Platform
The growing number of vehicles in a densely populated smart city results in a significant lack of parking space. During the implementation of systems for visibility of parking space vacancies for drivers, the bulk of the systems are focused on ...
Comments