Skip to main content

2024 | OriginalPaper | Buchkapitel

Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security

verfasst von : Nicolas Boltz, Larissa Schmid, Bahareh Taghavi, Christopher Gerking, Robert Heinrich

Erschienen in: Software Architecture

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Zero Trust is considered a powerful strategy for securing systems by emphasizing distrust of all resource access requests. There are different approaches to integrating ZTAs into a system, differing in their components, assembly, and allocation. Early evaluation and selection of the right approach can reduce the costs of resources. In this paper, we propose a novel zero trust architecture (ZTA) metamodel based on literature and industry applications. We introduce our proposed metamodel elements and provide a model instance using the Palladio Component Model (PCM). We describe the requirements for enabling two existing approaches to performance simulation and security data flow analysis on the architectural level and outline how we realize them in our PCM-based implementation. Our evaluation demonstrates the applicability of our ZTA metamodel. It can represent real-world ZTA approaches in various domains, enabling the simulation of performance impact and analysis of the correct implementation of zero trust principles at the architectural level.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alagappan, A., Venkatachary, S.K., Andrews, L.J.B.: Augmenting zero trust network architecture to enhance security in virtual power plants. Energy Rep. 8, 1309–1320 (2022)CrossRef Alagappan, A., Venkatachary, S.K., Andrews, L.J.B.: Augmenting zero trust network architecture to enhance security in virtual power plants. Energy Rep. 8, 1309–1320 (2022)CrossRef
2.
Zurück zum Zitat Alshareef, H., et al.: Precise analysis of purpose limitation in data flow diagrams. In: ARES (2022) Alshareef, H., et al.: Precise analysis of purpose limitation in data flow diagrams. In: ARES (2022)
3.
Zurück zum Zitat Becker, M., Becker, S., Meyer, J.: SimuLizar: design-time modeling and performance analysis of self-adaptive systems (2013) Becker, M., Becker, S., Meyer, J.: SimuLizar: design-time modeling and performance analysis of self-adaptive systems (2013)
4.
Zurück zum Zitat Becker, S., Koziolek, H., Reussner, R.: Model-based performance prediction with the palladio component model. In: WOSP, pp. 54–65 (2007) Becker, S., Koziolek, H., Reussner, R.: Model-based performance prediction with the palladio component model. In: WOSP, pp. 54–65 (2007)
5.
Zurück zum Zitat Bhuiyan, E.A., et al.: Towards next generation virtual power plant: technology review and frameworks. Renew. Sustain. Energy Rev. 150 (2021) Bhuiyan, E.A., et al.: Towards next generation virtual power plant: technology review and frameworks. Renew. Sustain. Energy Rev. 150 (2021)
7.
Zurück zum Zitat Chen, B., et al.: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE IoT J. 8(13), 10248–10263 (2020) Chen, B., et al.: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE IoT J. 8(13), 10248–10263 (2020)
8.
Zurück zum Zitat Chen, X., et al.: Zero trust architecture for 6G security. IEEE Netw. (2023) Chen, X., et al.: Zero trust architecture for 6G security. IEEE Netw. (2023)
13.
Zurück zum Zitat Fernandez, E.B., Brazhuk, A.: A critical analysis of zero trust architecture (ZTA). Comput. Stand. Interfaces 89, 103832 (2024)CrossRef Fernandez, E.B., Brazhuk, A.: A critical analysis of zero trust architecture (ZTA). Comput. Stand. Interfaces 89, 103832 (2024)CrossRef
14.
Zurück zum Zitat Ferraiolo, D.F., et al.: Proposed NIST standard for role-based access control. TISSEC 4(3), 224–274 (2001)CrossRef Ferraiolo, D.F., et al.: Proposed NIST standard for role-based access control. TISSEC 4(3), 224–274 (2001)CrossRef
15.
Zurück zum Zitat Ghate, N., et al.: Advanced zero trust architecture for automating fine-grained access control with generalized attribute relation extraction. IEICE Proc. Ser. 68(C1-5) (2021) Ghate, N., et al.: Advanced zero trust architecture for automating fine-grained access control with generalized attribute relation extraction. IEICE Proc. Ser. 68(C1-5) (2021)
17.
Zurück zum Zitat Gorsler, F., Brosig, F., Kounev, S.: Controlling the Palladio Bench using the Descartes Query Language. In: KPDAYS, pp. 109–118 (2013) Gorsler, F., Brosig, F., Kounev, S.: Controlling the Palladio Bench using the Descartes Query Language. In: KPDAYS, pp. 109–118 (2013)
19.
Zurück zum Zitat Heinrich, R. et al.: The palladio-bench for modeling and simulating software architectures. In: ICSE-C, pp. 37–40 (2018) Heinrich, R. et al.: The palladio-bench for modeling and simulating software architectures. In: ICSE-C, pp. 37–40 (2018)
21.
Zurück zum Zitat Jung, B.G. et al.: ZTA-based federated policy control paradigm for enterprise wireless network infrastructure. In: APCC, pp. 1–5 (2022) Jung, B.G. et al.: ZTA-based federated policy control paradigm for enterprise wireless network infrastructure. In: APCC, pp. 1–5 (2022)
22.
Zurück zum Zitat Lee, B. et al.: Situational awareness based risk-adapatable access control in enterprise networks. arXiv preprint arXiv:1710.09696 (2017) Lee, B. et al.: Situational awareness based risk-adapatable access control in enterprise networks. arXiv preprint arXiv:​1710.​09696 (2017)
25.
Zurück zum Zitat Osborn, B. et al.: BeyondCorp: design to deployment at google. USENIX Association: login: Magazine (2016) Osborn, B. et al.: BeyondCorp: design to deployment at google. USENIX Association: login: Magazine (2016)
26.
Zurück zum Zitat Paul, B., Rao, M.: Zero-trust model for smart manufacturing industry. Appl. Sci. 13(1), 221 (2022)CrossRef Paul, B., Rao, M.: Zero-trust model for smart manufacturing industry. Appl. Sci. 13(1), 221 (2022)CrossRef
27.
Zurück zum Zitat Ramezanpour, K., Jagannath, J.: Intelligent ZTA for 5G/6G networks: principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 217, 109358 (2022)CrossRef Ramezanpour, K., Jagannath, J.: Intelligent ZTA for 5G/6G networks: principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 217, 109358 (2022)CrossRef
28.
Zurück zum Zitat Reussner, R.H., et al.: Modeling and Simulating Software Architectures: The Palladio Approach. MIT Press, Cambridge (2016) Reussner, R.H., et al.: Modeling and Simulating Software Architectures: The Palladio Approach. MIT Press, Cambridge (2016)
29.
Zurück zum Zitat Rodigari, S., et al.: Performance analysis of zero-trust multi-cloud. In: 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), pp. 730–732 (2021) Rodigari, S., et al.: Performance analysis of zero-trust multi-cloud. In: 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), pp. 730–732 (2021)
31.
Zurück zum Zitat Runeson, P., et al.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley, Hoboken (2012)CrossRef Runeson, P., et al.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley, Hoboken (2012)CrossRef
32.
Zurück zum Zitat Seifermann, S., et al.: Detecting violations of access control and information flow policies in data flow diagrams. J. Syst. Softw. 184, 111138 (2022)CrossRef Seifermann, S., et al.: Detecting violations of access control and information flow policies in data flow diagrams. J. Syst. Softw. 184, 111138 (2022)CrossRef
33.
Zurück zum Zitat Sharma, V.S., Trivedi, K.S.: Quantifying software performance, reliability and security: an architecture-based approach. J. Syst. Softw. (2007) Sharma, V.S., Trivedi, K.S.: Quantifying software performance, reliability and security: an architecture-based approach. J. Syst. Softw. (2007)
34.
Zurück zum Zitat Sion, L. et al.: Solution-aware data flow diagrams for security threat modeling. In: SAC, pp. 1425–1432 (2018) Sion, L. et al.: Solution-aware data flow diagrams for security threat modeling. In: SAC, pp. 1425–1432 (2018)
35.
Zurück zum Zitat Strittmatter, M., Kechaou, A.: The media store 3 case study system. KIT (2016) Strittmatter, M., Kechaou, A.: The media store 3 case study system. KIT (2016)
36.
Zurück zum Zitat Teerakanok, S., Uehara, T., Inomata, A.: Migrating to zero trust architecture: reviews and challenges. Secur. Commun. Netw. (2021) Teerakanok, S., Uehara, T., Inomata, A.: Migrating to zero trust architecture: reviews and challenges. Secur. Commun. Netw. (2021)
37.
Zurück zum Zitat Tuma, K., Scandariato, R., Balliu, M.: Flaws in flows: unveiling design flaws via information flow analysis. In: ICSA, pp. 191–200 (2019) Tuma, K., Scandariato, R., Balliu, M.: Flaws in flows: unveiling design flaws via information flow analysis. In: ICSA, pp. 191–200 (2019)
38.
Zurück zum Zitat Ward, R., Beyer, B.: BeyondCorp: a new approach to enterprise security. USENIX Association: login: Magazine (2014) Ward, R., Beyer, B.: BeyondCorp: a new approach to enterprise security. USENIX Association: login: Magazine (2014)
Metadaten
Titel
Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security
verfasst von
Nicolas Boltz
Larissa Schmid
Bahareh Taghavi
Christopher Gerking
Robert Heinrich
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-70797-1_17