TY - JOUR
T1 - Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture
AU - Zhang, Jingci
AU - Zheng, Jun
AU - Zhang, Zheng
AU - Chen, Tian
AU - Qiu, Kefan
AU - Zhang, Quanxin
AU - Li, Yuanzhang
N1 - Publisher Copyright:
© 2022 Wiley Periodicals LLC.
PY - 2022/12
Y1 - 2022/12
N2 - With recent cyber security attacks, the “border defense” security protection mechanism has often penetrated and broken through, and the “borderless” security defense idea—Zero Trust was proposed. The device application sandbox deployment model is one of the four essential Zero Trust architecture device deployment models. The isolation of the application sandbox directly affects the security of trusted applications. Given the security risks, such as sandbox escape in the sandbox application, we propose a hybrid isolation model based on access behavior and give the formal definition and security characteristics of the model. The model dynamically determines the security identity of the subject according to the access behavior and controls the access operation of the application sandbox. Therefore, the sandbox meets the characteristics of autonomous security, domain isolation, and integrity, ensuring that the system is always in an isolated safe state and easy to use. Finally, we implement the security model based on the container and Linux security module, and test the network and disk performance of this model. What is more, we make security comparison experiments based on the same container escape vulnerability. The experimental results show that the security model proposed in this paper effectively enhances the security of the device application sandboxing deployment model in Zero Trust architecture, and has a better performance compared with Container-SELinux.
AB - With recent cyber security attacks, the “border defense” security protection mechanism has often penetrated and broken through, and the “borderless” security defense idea—Zero Trust was proposed. The device application sandbox deployment model is one of the four essential Zero Trust architecture device deployment models. The isolation of the application sandbox directly affects the security of trusted applications. Given the security risks, such as sandbox escape in the sandbox application, we propose a hybrid isolation model based on access behavior and give the formal definition and security characteristics of the model. The model dynamically determines the security identity of the subject according to the access behavior and controls the access operation of the application sandbox. Therefore, the sandbox meets the characteristics of autonomous security, domain isolation, and integrity, ensuring that the system is always in an isolated safe state and easy to use. Finally, we implement the security model based on the container and Linux security module, and test the network and disk performance of this model. What is more, we make security comparison experiments based on the same container escape vulnerability. The experimental results show that the security model proposed in this paper effectively enhances the security of the device application sandboxing deployment model in Zero Trust architecture, and has a better performance compared with Container-SELinux.
KW - access control model
KW - device application sandboxing
KW - isolation mechanism
KW - zero trust architecture
UR - http://www.scopus.com/inward/record.url?scp=85136598219&partnerID=8YFLogxK
U2 - 10.1002/int.23037
DO - 10.1002/int.23037
M3 - Article
AN - SCOPUS:85136598219
SN - 0884-8173
VL - 37
SP - 11167
EP - 11187
JO - International Journal of Intelligent Systems
JF - International Journal of Intelligent Systems
IS - 12
ER -