TY - GEN
T1 - Quantum-Enhanced Zero Trust Security
T2 - 1st International Conference on Quantum Communications, Networking, and Computing, QCNC 2024
AU - Lin, Jun
AU - Jiang, Qiu
AU - Zhang, Weiyong
AU - Lin, Zihao
AU - Du, Xiaojiang
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - In today's fast-paced digital economy, the widespread adoption of new technologies brings about significant challenges in network security. This paper delves into the evolution of Zero Trust network architecture, marking a significant shift from traditional perimeter-centric security methods. It embraces the 'never trust, always verify' philosophy, moving away from conventional approaches. Subsequently, the paper explores the strategic implementation of Zero Trust, focusing on essential components such as Policy Enforcement Points (PEP) and Identity and Access Management (IAM). It also addresses the challenges in deploying Zero Trust architectures, including the high demands for real-time detection, and suggests viable solutions to these challenges. An important aspect of this study is the emerging role of quantum technology in enhancing network security. The integration of quantum technology with Zero Trust principles is poised to offer more robust network protection, particularly with the advancements in quantum key research. Current research in quantum keys opens new avenues for applying the Zero Trust philosophy in practical scenarios. This fusion is instrumental in laying the foundation for a more secure and innovative network security framework, aiming to effectively counter the evolving digital threats and strengthen the infrastructure of the digital economy against potential vulnerabilities.
AB - In today's fast-paced digital economy, the widespread adoption of new technologies brings about significant challenges in network security. This paper delves into the evolution of Zero Trust network architecture, marking a significant shift from traditional perimeter-centric security methods. It embraces the 'never trust, always verify' philosophy, moving away from conventional approaches. Subsequently, the paper explores the strategic implementation of Zero Trust, focusing on essential components such as Policy Enforcement Points (PEP) and Identity and Access Management (IAM). It also addresses the challenges in deploying Zero Trust architectures, including the high demands for real-time detection, and suggests viable solutions to these challenges. An important aspect of this study is the emerging role of quantum technology in enhancing network security. The integration of quantum technology with Zero Trust principles is poised to offer more robust network protection, particularly with the advancements in quantum key research. Current research in quantum keys opens new avenues for applying the Zero Trust philosophy in practical scenarios. This fusion is instrumental in laying the foundation for a more secure and innovative network security framework, aiming to effectively counter the evolving digital threats and strengthen the infrastructure of the digital economy against potential vulnerabilities.
KW - Network Security
KW - Quantum Technology
KW - Zero Trust
UR - http://www.scopus.com/inward/record.url?scp=85203679603&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85203679603&partnerID=8YFLogxK
U2 - 10.1109/QCNC62729.2024.00040
DO - 10.1109/QCNC62729.2024.00040
M3 - Conference contribution
AN - SCOPUS:85203679603
T3 - Proceedings - 2024 International Conference on Quantum Communications, Networking, and Computing, QCNC 2024
SP - 211
EP - 215
BT - Proceedings - 2024 International Conference on Quantum Communications, Networking, and Computing, QCNC 2024
Y2 - 1 July 2024 through 3 July 2024
ER -