信息安全研究 ›› 2024, Vol. 10 ›› Issue (10): 937-.

• 零信任安全专题 • 上一篇    下一篇

基于零信任架构与最小权限原则的配电终端物联网数据共享访问控制方法

林奕夫1陈雪2徐梦宇3陈云3   

  1. 1(国网福建省电力有限公司福州350003)
    2(国网福建省电力有限公司经济技术研究院福州350013)
    3(上海物盾信息科技有限公司上海201100)
  • 出版日期:2024-10-15 发布日期:2024-10-26
  • 通讯作者: 林奕夫 硕士,工程师.主要研究方向为电气工程. yf.lin@qq.com
  • 作者简介:林奕夫 硕士,工程师.主要研究方向为电气工程. yf.lin@qq.com 陈雪 硕士,高级工程师.主要研究方向为配电技术. 50580111@qq.com 徐梦宇 工程师.主要研究方向为电力数智化. xumy@wudun.net 陈云 工程师.主要研究方向为物联网安全. yun.chen@wudun.net

Data Sharing Access Control Method for Distribution Terminal IoT #br# Based on Zero Trust Architecture and Least Privilege Principle#br#

Lin Yifu1, Chen Xue2, Xu Mengyu3, and Chen Yun3   

  1. 1(State Grid Fujian Electric Power Co., Ltd., Fuzhou 350003)
    2(Research Institute of Economics and Technology, State Grid Fujian Electric Power Co., Ltd., Fuzhou 350013)
    3(Shanghai Wudun Information Technology Co., Ltd., Shanghai 201100)
  • Online:2024-10-15 Published:2024-10-26

摘要: 为最大程度保护配电终端物联网数据共享安全,提出基于零信任架构与最小权限原则的配电终端物联网数据共享访问控制方法.构建基于零信任的物联网数据共享访问控制框架,通过身份认证模块检验用户身份和访问控制权限,利用IDS模块辨别用户入网后的明显网络攻击行为,用户行为度量模块的行为信任度量代理,依据存储在信任度量数据库中的用户历史行为度量数据计算用户信任度,对用户的行为信任等级进行周期性评估,识别长期潜伏且高度隐蔽的网络攻击行为,基于行为信任的访问决策代理以用户信任等级为依据,依据最小权限原则进行用户角色分配,制定和实施访问决策;物联网控制器根据信任度量结果动态调整用户资源访问的权限,通过发送流表的方式实现用户配电终端物联网资源访问权限的动态调整.实验结果表明,该方法能够准确控制物联网数据的共享访问,且综合性能更全面,在完成用户访问任务的同时拥有的冗余权限最少,既满足了用户访问要求又保证了网络数据安全.

关键词: 零信任架构, 最小权限原则, 配电终端, 物联网, 用户信用度, 冗余权限

Abstract: To maximize the security of IoT data sharing in distribution terminals, a data sharing access control method for distribution terminal IoT based on zero trust architecture and least privilege principle is proposed. We have developed a zerotrustbased IoT data sharing access control framework, which verifies user identity and access control permissions through identity authentication modules. After user access, IDS modules identify obvious network attack behaviors, while behavior trust measurement proxies in user behavior measurement modules, calculate user trust based on historical user behavior measurement data stored in trust measurement databases, and periodically evaluate user behavior trust levels, identify longterm and highly covert network attack behaviors. These proxies also periodically evaluate user behavior trust levels, identify longterm and highly covert network attack behaviors, and use behavioral trustbased access decision agents to allocate user roles based on the user trust level and the principle of least privilege, formulating and implementing access decisions. The IoT controller dynamically adjusts user resource access permissions based on trust measurement results, and achieves dynamic adjustment of user distribution terminal IoT resource access permissions by sending flow tables. The experimental results show that this method can accurately control the shared access of IoT data, and has more comprehensive performance. It has the least redundant permissions while completing user access tasks, which not only meets user access requirements but also ensures network data security.

Key words: zero trust architecture, the principle of least privilege, distribution terminal, Internet of things, user credit, redundant permission

中图分类号: