Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (4): 1232-1240.DOI: 10.11772/j.issn.1001-9081.2024040526
• Cyber security • Previous Articles Next Articles
Zuoguang WANG, Chao LI(), Li ZHAO
Received:
2024-04-26
Revised:
2024-07-19
Accepted:
2024-07-24
Online:
2025-04-08
Published:
2025-04-10
Contact:
Chao LI
About author:
WANG Zuoguang, born in 1990, Ph. D., assistant research fellow. His research interests include information security, social work safety, cyberspace safety, industrial control safety.Supported by:
通讯作者:
李超
作者简介:
王作广(1990—),男,河南新乡人,助理研究员,博士,CCF会员,主要研究方向:信息安全、社工安全、网络空间安全、工控安全基金资助:
CLC Number:
Zuoguang WANG, Chao LI, Li ZHAO. Framework and implementation of network data security protection based on zero trust[J]. Journal of Computer Applications, 2025, 45(4): 1232-1240.
王作广, 李超, 赵利. 基于零信任的网络数据安全保护框架与实现[J]. 《计算机应用》唯一官方网站, 2025, 45(4): 1232-1240.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024040526
接口名称 | 参数名称 | 参数说明 |
---|---|---|
初始化Initialize | pincode[in] | 可信模块中存储私钥文件的解密钥 |
puccfgfilepath[in] | 配置文件全路径 | |
phapphandle[out] | 返回模块应用接口句柄 | |
ZIAM模块反初始化Deinitialize | phapphandle[in] | 模块应用接口句柄 |
配置ZTNA模块SetParam | phapphandle[in] | 模块应用接口句柄 |
obj[in] | 可信模块参数 | |
下载证书链DownloadChain | phapphandle[in] | 模块应用接口句柄 |
chainfilename[in] | 带绝对路径的证书链文件 | |
销毁证书链DestroyChain | phapphandle[in] | 模块应用接口句柄 |
国密证书签发CertDownload | phapphandle[in] | 模块应用接口句柄 |
certsubjectname[in] | 证书主题 | |
启动ZTNA模块的数据处理业务StartCS | phapphandle[in] | 模块应用接口句柄 |
结束ZTNA模块的数据处理业务StopCS | phapphandle[in] | 模块应用接口句柄 |
查询ZTNA模块的状态FindStatus | phapphandle[in] | 模块应用接口句柄 |
status[out] | 模块状态 | |
上传ZTNA模块日志UploadLog | phapphandle[in] | 模块应用接口句柄 |
logname[in] | 模块日志文件名绝对路径 |
Tab. 1 Main functional interfaces and parameters of ZIAM module
接口名称 | 参数名称 | 参数说明 |
---|---|---|
初始化Initialize | pincode[in] | 可信模块中存储私钥文件的解密钥 |
puccfgfilepath[in] | 配置文件全路径 | |
phapphandle[out] | 返回模块应用接口句柄 | |
ZIAM模块反初始化Deinitialize | phapphandle[in] | 模块应用接口句柄 |
配置ZTNA模块SetParam | phapphandle[in] | 模块应用接口句柄 |
obj[in] | 可信模块参数 | |
下载证书链DownloadChain | phapphandle[in] | 模块应用接口句柄 |
chainfilename[in] | 带绝对路径的证书链文件 | |
销毁证书链DestroyChain | phapphandle[in] | 模块应用接口句柄 |
国密证书签发CertDownload | phapphandle[in] | 模块应用接口句柄 |
certsubjectname[in] | 证书主题 | |
启动ZTNA模块的数据处理业务StartCS | phapphandle[in] | 模块应用接口句柄 |
结束ZTNA模块的数据处理业务StopCS | phapphandle[in] | 模块应用接口句柄 |
查询ZTNA模块的状态FindStatus | phapphandle[in] | 模块应用接口句柄 |
status[out] | 模块状态 | |
上传ZTNA模块日志UploadLog | phapphandle[in] | 模块应用接口句柄 |
logname[in] | 模块日志文件名绝对路径 |
模块TCP服务协议功能 | 协议数据格式 | 命令成功返回 |
---|---|---|
状态查询 | QUERYSTATUS | 初始化自检完成 |
启动数据处理与传输业务 | STARTCS | STARTCSACK:OKIP= |
停止数据处理与传输业务 | STOPCS | STOPCSACK:OK |
参数设置 | SETPARAM:xxx | SETPARAMACK:OK |
阐述查询 | GETPARAM | GETPARAM:OK params |
上传日志 | GETLOG | GETLOG: OK log |
下载证书链 | SETCHAIN:证书内容 | SETCHAINACK:OK |
销毁证书链 | DESTORYCHAIN | DESTORYCHAIN:OK |
国密证书签发 | SETGMCERTP10:CN= | SETGMCERTP10ACK:OKP10 |
签名证书导入 | IMPORTSIGNCERT:CERT= | IMPORTSIGNCERTACK:OK |
加密证书导入 | IMPORTCRYPTCERT:CERT=xxx | IMPORTCRYPTCERTACK:OK |
加密私钥导入 | IMPORTCRYPTKEY:KEY= | IMPORTCRYPTKEY:OK |
Tab. 2 Main functional interfaces and parameters of ZTNA module
模块TCP服务协议功能 | 协议数据格式 | 命令成功返回 |
---|---|---|
状态查询 | QUERYSTATUS | 初始化自检完成 |
启动数据处理与传输业务 | STARTCS | STARTCSACK:OKIP= |
停止数据处理与传输业务 | STOPCS | STOPCSACK:OK |
参数设置 | SETPARAM:xxx | SETPARAMACK:OK |
阐述查询 | GETPARAM | GETPARAM:OK params |
上传日志 | GETLOG | GETLOG: OK log |
下载证书链 | SETCHAIN:证书内容 | SETCHAINACK:OK |
销毁证书链 | DESTORYCHAIN | DESTORYCHAIN:OK |
国密证书签发 | SETGMCERTP10:CN= | SETGMCERTP10ACK:OKP10 |
签名证书导入 | IMPORTSIGNCERT:CERT= | IMPORTSIGNCERTACK:OK |
加密证书导入 | IMPORTCRYPTCERT:CERT=xxx | IMPORTCRYPTCERTACK:OK |
加密私钥导入 | IMPORTCRYPTKEY:KEY= | IMPORTCRYPTKEY:OK |
安全特性 | 对应的功能或设计 | |
---|---|---|
以身份为中心的访问控制与授权 | 通过接入网关认证之后获取访问策略,授权可以访问的资源和应用 | |
身份识别与认证 | 用户身份识别与认证 | 基于用户名与口令的身份认证 |
基于国密数字证书的认证 | ||
设备身份识别与认证 | ||
基于设备指纹的身份认证 | ||
认证与授权的动态更新 | 实时监控、评估可信网络访问模块、接入认证网关的运行状态,持续认证、动态更新访问授权 | |
可信计算 | 基于国产安全芯片(可信密码模块)的硬件与底层系统,构建独立的可信计算环境 | |
数据安全处理与传输 | 基于国密体系的密钥协商与交换 基于SM2、SM3、SM4算法的数据加密、数据签名、完整性检验、数据安全传输 | |
安全审计 | 日志记录与审计 |
Tab. 3 Security characteristics of zero trust data protection framework
安全特性 | 对应的功能或设计 | |
---|---|---|
以身份为中心的访问控制与授权 | 通过接入网关认证之后获取访问策略,授权可以访问的资源和应用 | |
身份识别与认证 | 用户身份识别与认证 | 基于用户名与口令的身份认证 |
基于国密数字证书的认证 | ||
设备身份识别与认证 | ||
基于设备指纹的身份认证 | ||
认证与授权的动态更新 | 实时监控、评估可信网络访问模块、接入认证网关的运行状态,持续认证、动态更新访问授权 | |
可信计算 | 基于国产安全芯片(可信密码模块)的硬件与底层系统,构建独立的可信计算环境 | |
数据安全处理与传输 | 基于国密体系的密钥协商与交换 基于SM2、SM3、SM4算法的数据加密、数据签名、完整性检验、数据安全传输 | |
安全审计 | 日志记录与审计 |
1 | Ponemon Institute, DTEX. 2023 cost of insider risks: global report[R/OL]. [2024-02-28].. |
2 | Ponemon Institute. 2020 cost of insider threats global report[R/OL]. [2024-02-28].. |
3 | CHARFEDDINE M, KAMMOUN H M, HAMDAOUI B, et al. ChatGPT’s security risks and benefits: offensive and defensive use-cases, mitigation measures, and future implications[J]. IEEE Access, 2024, 12: 30263-30310. |
4 | 王作广,朱红松,孙利民. 社工概念演化分析[J]. 信息安全学报, 2021, 6(2): 12-29. |
WANG Z G, ZHU H S, SUN L M. The concept evolution analysis of social engineering[J]. Journal of Cyber Security, 2021, 6(2): 12-29. | |
5 | AGHAO K R, TRIBHUVAN V. Hardware vulnerability: meltdown[C]// Proceedings of the 2023 International Conference on Communication, Electronics and Digital Technology, LNNS 676. Singapore: Springer, 2023: 217-228. |
6 | PATEL R. The final countdown: how much longer until quantum computers become the next cybersecurity threat[J]. The Canadian Science Fair Journal, 2022, 3(6): 1-6. |
7 | CVE. CVE-2014-0160[EB/OL]. [2024-02-21].. |
8 | BOJANOVA I, GALHARDO C E C. Heartbleed revisited: is it just a buffer over-read?[J]. IT Professional, 2023, 25(2): 83-89. |
9 | BENCSÁTH B, PÉK G, BUTTYÁN L, et al. The cousins of Stuxnet: Duqu, Flame, and Gauss[J]. Future Internet, 2012, 4(4): 971-1003. |
10 | 全国信息安全标准化技术委员会. 网络安全标准实践指南——网络数据分类分级指引: TC260-PG-20212A [S/OL]. [2024-03-02]. . |
National Information Security Standardization Technical Committee. Network security standard practice guide — network data classification and grading guidelines: TC260-PG-20212A [S/OL]. [2024-03-02]. . | |
11 | 全国信息安全标准化技术委员会秘书处. 关于征求国家标准《信息安全技术 网络数据分类分级要求》(征求意见稿)意见的通知[EB/OL]. [2024-03-02]. . |
Secretariat of National Information Security Standardization Technical Committee. Notice on the soliciting opinions on national standard “Network security standard practice guide — network data classification and grading guidelines” (draft for comments)[EB/OL]. [2024-03-02]. . | |
12 | 张宇,张妍. 零信任研究综述[J]. 信息安全研究, 2020, 6(7): 608-614. |
ZHANG Y, ZHANG Y. A survey of zero trust research[J]. Journal of Information Security Research, 2020, 6(7): 608-614. | |
13 | ROSE S, BORCHERT O, MITCHELL S, et al. Zero trust architecture: NIST Special Publication 800-207[EB/OL]. [2024-02-28].. |
14 | 诸葛程晨,王群,刘家银,等. 零信任网络综述[J]. 计算机工程与应用, 2022, 58(22): 12-29. |
ZHUGE C C, WANG Q, LIU J Y, et al. Survey of zero trust network[J]. Computer Engineering and Applications, 2022, 58(22): 12-29. | |
15 | 王群,袁泉,李馥娟,等. 零信任网络及其关键技术综述[J]. 计算机应用, 2023, 43(4): 1142-1150. |
WANG Q, YUAN Q, LI F J, et al. Review of zero trust network and its key technologies[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150. | |
16 | BERTINO E. Zero trust architecture: does it help?[J]. IEEE Security and Privacy, 2021, 19(5): 95-96. |
17 | GREENWOOD D. Applying the principles of zero-trust architecture to protect sensitive and critical data[J]. Network Security, 2021, 2021(6): 7-9. |
18 | 国家密码管理局——标准规范[EB/OL]. [2024-02-28].. |
Standard Specification of State Cryptography Administration[EB/OL]. [2024-02-28].. | |
19 | 国家密码管理局. 国家密码管理局关于发布《SM2椭圆曲线公钥密码算法》公告[EB/OL]. [2024-02-28].. |
State Cryptography Administration. State Cryptography Administration’s notice about publishing “Public key cryptographic algorithm SM2 based on elliptic curves”[EB/OL]. [2024-02-28].. | |
20 | 石孟鑫. 基于国密算法的安全芯片设计与实现[D]. 沈阳:辽宁大学, 2022. |
SHI M X. Design and implementation of security chip based on national secret algorithm[D]. Shenyang: Liaoning University, 2022. | |
21 | 冯登国,秦宇,汪丹,等. 可信计算技术研究[J]. 计算机研究与发展, 2011, 48(8): 1332-1349. |
FENG D G, QIN Y, WANG D, et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011, 48(8): 1332-1349. | |
22 | 孙铂. 基于国产平台的TCM应用研究[D]. 太原:中北大学, 2017. |
SUN B. Research of TCM applied on native platform[D]. Taiyuan: North University of China, 2017. | |
23 | 姚键. 国产商用密码算法研究及性能分析[J]. 计算机应用与软件, 2019, 36(6): 327-333. |
YAO J. Domestic commercial cryptographic algorithm and its performance analysis[J]. Computer Applications and Software, 2019, 36(6): 327-333. |
[1] | Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA. Review of zero trust network and its key technologies [J]. Journal of Computer Applications, 2023, 43(4): 1142-1150. |
[2] | XIAO Yuelei, DENG Xiaofan. Improvement and analysis of certificate-based wired local area network security association scheme [J]. Journal of Computer Applications, 2021, 41(7): 1970-1976. |
[3] | ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang. Data trading scheme based on blockchain and trusted computing [J]. Journal of Computer Applications, 2021, 41(4): 939-944. |
[4] | QI Neng, TAN Liang. Trust chain model with waterfall characteristic based on trusted virtualization platform [J]. Journal of Computer Applications, 2018, 38(2): 327-336. |
[5] | XU Mingdi, GAO Yang, GAO Xueyuan, ZHANG Fan. Correspondence property-based platform configuration attestation [J]. Journal of Computer Applications, 2018, 38(2): 337-342. |
[6] | XIAO Yuelei, WU Junsheng, ZHU Zhixiang. Improvement and analysis of LAN security association scheme based on pre-shared key [J]. Journal of Computer Applications, 2018, 38(11): 3246-3251. |
[7] | SUN Liang, CHEN Xiaochun, ZHENG Shujian, LIU Ying. Research and application for terminal location management system based on firmware [J]. Journal of Computer Applications, 2017, 37(2): 417-421. |
[8] | ZHANG Xin, YANG Xiaoyuan, ZHU Shuaishuai. Trusted and anonymous authentication protocol for mobile networks [J]. Journal of Computer Applications, 2016, 36(8): 2231-2235. |
[9] | WENG Xiaokang ZHANG Ping WANG Wei ZHU Yi. Remote attestation mechanism for platform integrity based on unbalanced-Hash tree [J]. Journal of Computer Applications, 2014, 34(2): 433-437. |
[10] | WU Hao LIU Xiaojie LUO Peng. TRAP-4 based continuous data protection system [J]. Journal of Computer Applications, 2014, 34(1): 54-57. |
[11] | HE Long PENG Xinguang. Safe and efficient remote attestation protocol based on bilinear pairings signcryption [J]. Journal of Computer Applications, 2013, 33(10): 2854-2857. |
[12] | SHAO Jing CHEN Xingyuan DU Xuehui CAO Lifeng. Distributed multilevel security core architecture based on noninterference theory [J]. Journal of Computer Applications, 2013, 33(03): 712-716. |
[13] | YAO Jianhua WU Jiamin NIU Wenjia TONG Endong. Remote sensing service discovery mechanism based on trusted QoS clustering [J]. Journal of Computer Applications, 2013, 33(02): 587-591. |
[14] | MO Jiaqing HU Zhongwang YE Xuelin. Research of trust assessment method in trust computing based on fuzzy theory [J]. Journal of Computer Applications, 2013, 33(01): 142-145. |
[15] | FU Dong-lai PENG Xin-guang CHEN Gou-xi YANG Qiu-xiang. Remote attestation mechanism of platform configuration based on dynamic Huffman tree [J]. Journal of Computer Applications, 2012, 32(08): 2275-2282. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||