TY - GEN
T1 - Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture
AU - Zhang, Jingci
AU - Zheng, Jun
AU - Zhang, Zheng
AU - Chen, Tian
AU - Qiu, Kefan
AU - Zhang, Quanxin
AU - Li, Yuanzhang
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - With recent cyber security attacks, “border defense” security protection mechanism has been repeatedly infiltrated breakthrough, and the “border defense” security protection mechanism has often penetrated and broken through, and the “borderless” security defense idea of “Never Trust, Always Verify” – Zero Trust was proposed. The device application sandbox deployment model is one of the four essential zero trust architecture device deployment models. Isolation sandboxes isolate trusted applications from potential threats. The isolation of the application sandbox directly affects the security of trusted applications. Given the security risks such as sandbox escape in the sandbox application, we propose a hybrid isolation model based on access behavior (AB-HIM) and give the formal definition and security characteristics of the model. The model dynamically determines the security identity of the subject according to the access behavior and controls the access operation of the application sandbox. Therefore, the sandbox meets the characteristics of autonomous security, domain isolation, and integrity, ensuring that the system is always in an isolated safe state and easy to use. Finally, zero trust architecture device application sandboxing deployment environment based on containers and Linux security module implements the security model. And aiming at the same container escape vulnerability, we make security comparison experiments. The experimental results show that the security model proposed in this paper effectively enhances the security of the device application sandboxing deployment model in zero trust architecture.
AB - With recent cyber security attacks, “border defense” security protection mechanism has been repeatedly infiltrated breakthrough, and the “border defense” security protection mechanism has often penetrated and broken through, and the “borderless” security defense idea of “Never Trust, Always Verify” – Zero Trust was proposed. The device application sandbox deployment model is one of the four essential zero trust architecture device deployment models. Isolation sandboxes isolate trusted applications from potential threats. The isolation of the application sandbox directly affects the security of trusted applications. Given the security risks such as sandbox escape in the sandbox application, we propose a hybrid isolation model based on access behavior (AB-HIM) and give the formal definition and security characteristics of the model. The model dynamically determines the security identity of the subject according to the access behavior and controls the access operation of the application sandbox. Therefore, the sandbox meets the characteristics of autonomous security, domain isolation, and integrity, ensuring that the system is always in an isolated safe state and easy to use. Finally, zero trust architecture device application sandboxing deployment environment based on containers and Linux security module implements the security model. And aiming at the same container escape vulnerability, we make security comparison experiments. The experimental results show that the security model proposed in this paper effectively enhances the security of the device application sandboxing deployment model in zero trust architecture.
KW - Access control model
KW - Device application sandboxing
KW - Isolation mechanism
KW - Zero trust architecture
UR - http://www.scopus.com/inward/record.url?scp=85140489639&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-16815-4_7
DO - 10.1007/978-3-031-16815-4_7
M3 - Conference contribution
AN - SCOPUS:85140489639
SN - 9783031168147
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 104
EP - 123
BT - Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings
A2 - Zhou, Jianying
A2 - Chattopadhyay, Sudipta
A2 - Adepu, Sridhar
A2 - Alcaraz, Cristina
A2 - Batina, Lejla
A2 - Casalicchio, Emiliano
A2 - Jin, Chenglu
A2 - Lin, Jingqiang
A2 - Losiouk, Eleonora
A2 - Majumdar, Suryadipta
A2 - Meng, Weizhi
A2 - Picek, Stjepan
A2 - Zhauniarovich, Yury
A2 - Shao, Jun
A2 - Su, Chunhua
A2 - Wang, Cong
A2 - Zonouz, Saman
PB - Springer Science and Business Media Deutschland GmbH
T2 - Satellite Workshops on AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA 2022, held in conjunction with the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022
Y2 - 20 June 2022 through 23 June 2022
ER -