skip to main content
10.1145/3546000.3546015acmotherconferencesArticle/Chapter ViewAbstractPublication Pageshp3cConference Proceedingsconference-collections
research-article

Secure Mechanism of Intelligent Urban Railway Cloud Platform Based on Zero-trust Security Architecture

Authors Info & Claims
Published:19 August 2022Publication History

ABSTRACT

Aiming to strengthen the stability of operation and maintenance of the urban rail transit network cloud platform at this stage, it is emerging to solve the security mechanism of the intelligent urban railway cloud platform. In this paper, we proposed a zero-trust network security solution for the rail transit system network construction. First, we built a zero-trust network construction for smart city rail transit at the architecture level, it can break the phenomenon of information security silo of rail transit line platform and minimize the system security risk based on a zero-trust network. Next, we focus on building a cloud security brain for urban rail transit networks and proposed the self-learning trust algorithm for a zero-trust network. Specifically, we illustrated the modified network model and constructed a dynamic updating user trust profile as the trustworthy access list. The parameters of the self-learning trust algorithm consist of the state, available chain road bandwidth, waiting for queue state of network traffic, linkage actions, and so on. We adopted a dynamic self-learning strategy for adjusting mitigation policy, the learning step predicted the state of the predetermined congestion and selected the rich links for execution. Finally, experiments show the efficiency of our secure mechanism of railway cloud platform based on zero-trust security architecture.

References

  1. Baum-Snow N, Kahn M E, Voith R. Effects of urban rail transit expansions: Evidence from sixteen cities, 1970-2000 [with comment][J]. Brookings-Wharton papers on urban affairs, 2005: 147-206.Google ScholarGoogle Scholar
  2. Embrey, Bryan. "The top three factors driving zero trust adoption." Computer Fraud & Security 2020.9 (2020): 13-15.Google ScholarGoogle ScholarCross RefCross Ref
  3. Tu H. Research on the Application of Cloud Computing Technology in Urban Rail Transit[C]//2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE, 2020: 828-831.Google ScholarGoogle Scholar
  4. Greenwood D. Applying the principles of zero-trust architecture to protect sensitive and critical data[J]. Network Security, 2021, 2021(6): 7-9.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mahendra Bhatu Gawali and Subhash K. Shinde, "Standard Deviation Based Modified Cuckoo Optimization Algorithm for Task Scheduling to Efficient Resource Allocation in Cloud Computing," Vol. 8, No. 4, pp. 210-218, November, 2017. doi: 10.12720/jait.8.4.210-218Google ScholarGoogle Scholar
  6. Suryakanthi Tangirala, "Efficient Big Data Analytics and Management through the Usage of Cloud Architecture," Vol. 7, No. 4, pp. 302-307, November, 2016. doi: 10.12720/jait.7.4.302-307Google ScholarGoogle Scholar
  7. Kindervag, John. "Build security into your network's dna: The zero trust network architecture." Forrester Research Inc (2010): 1-26.Google ScholarGoogle Scholar
  8. Stafford V A. Zero-trust architecture[J]. NIST Special Publication, 2020, 800: 207.Google ScholarGoogle Scholar
  9. Cunningham C, Emerging Z T P A. The Zero-trust eXtended (ZTX) ecosystem[J]. Forrester, Cambridge, MA, 2018.Google ScholarGoogle Scholar
  10. Patil A P, Karkal G, Wadhwa J, Design and Implementation of a Consensus Algorithm to build Zero-trust Model[C]//2020 IEEE 17th India Council International Conference (INDICON). IEEE, 2020: 1-5.Google ScholarGoogle Scholar
  11. Collier, Zachary A., and Joseph Sarkis. "The zero trust supply chain: Managing supply chain risk in the absence of trust." International Journal of Production Research (2021): 1-16.Google ScholarGoogle Scholar
  12. Mehraj S, Banday M T. Establishing a zero trust strategy in cloud computing environment[C]//2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020: 1-6.Google ScholarGoogle Scholar
  13. DeCusatis, Casimer, "Implementing zero trust cloud networks with transport access control and first packet authentication." 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 2016.Google ScholarGoogle Scholar
  14. Armin Shams, Hossein Sharif, and Markus Helfert, "A Novel Model for Cloud Computing Analytics and Measurement," Journal of Advances in Information Technology, Vol. 12, No. 2, pp. 93-106, May 2021. doi: 10.12720/jait.12.2.93-106Google ScholarGoogle ScholarCross RefCross Ref
  15. Rodigari S, O'Shea D, McCarthy P, Performance Analysis of Zero-Trust multi-cloud[C]//2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021: 730-732.Google ScholarGoogle Scholar
  16. Xue Z, Xiang M. Data Center Security Protection under Zero-Trust Security Model[J]. Communications Technology, 2017, 50(06): 1290-1294.Google ScholarGoogle Scholar
  17. Beck E J. How zero-trust network security can enable recovery from cyberattacks[J]. ISACA Journal, 2014, 6: 14-18.Google ScholarGoogle Scholar
  18. Nasif Muslim, Salekul Islam, and Jean-Charles Grégoire, "Reinforcement Learning Based Offloading Framework for Computation Service in the Edge Cloud and Core Cloud," Journal of Advances in Information Technology, Vol. 13, No. 2, pp. 139-146, April 2022Google ScholarGoogle Scholar
  19. Lowe R, Wu Y I, Tamar A, Multi-agent actor-critic for mixed cooperative-competitive environments[J]. Advances in neural information processing systems, 2017, 30.Google ScholarGoogle Scholar
  20. Yu C, Velu A, Vinitsky E, The Surprising Effectiveness of PPO in Cooperative, Multi-Agent Games[J]. arXiv preprint arXiv:2103.01955, 2021.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    HP3C '22: Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications
    June 2022
    221 pages
    ISBN:9781450396295
    DOI:10.1145/3546000

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 19 August 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)64
    • Downloads (Last 6 weeks)13

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format