create a dynamic and adaptive defense system that
responds proactively to potential intrusions,
mitigating risks in real-time and fortifying the
security posture of their networks.
As it is seen, the literature review helped identify
several significant challenges in using Zero Trust
anonymization to enhance the accuracy and security
of organizational networks. The following research
gaps are identified:
Research Gap 1: The security issues of
outsourcing the IDS tasks to third-party analysts
are not identified, i.e., semantic attacks.
Research Gap 2: Therefore, an effective solution
for this scenario has not yet been proposed
Research Gap 3: The challenges pertaining to
designing such a solution are unknown.
5 CONCLUSIONS
The increase in the tendency to apply cloud
computing, the Internet of Things, and mobile device
use has dissolved traditional network boundaries.
Hardened network perimeters alone are no longer
effective for providing enterprise security in a world
of cloud computing and increasingly sophisticated
threats.
The Zero Trust approach combines tight identity-
based verification for every person and device
attempting to access resources on a private network
or the cloud, regardless of whether they are inside or
outside the network perimeter. Zero Trust should be
considered as a holistic framework rather than be
associated with any specific security approach or
method. Indeed, it is based on a variety of principles,
methods, and ideas of cybersecurity integrated to
ensure digital security. Examples include, among
others, the prevention of semantic threats, segmenting
networks, granular user-access management, and
minimization of lateral movement. Zero Trust
Architecture could offer an excellent solution to
organizations seeking to outsource IDS services to
third-party analysts while reducing semantic attack
threats. However, the specific anonymization
mechanisms ensuring a good balance between
privacy and security of such ZTA-based systems are
still being explored.
Based on the reviewed literature, the dominant
anonymization approaches are based on HE systems
which suffer from a number of setbacks, sacrificing
either privacy or analytical data accuracy in the
process of encryption. MV-based systems may offer
a better solution, but they are not sufficiently explored
yet. This review is a part of large-scale research that
proposes and evaluates a comprehensive ZTA for the
IDS system ZTA-IDS. Such a system could offer a
much-needed solution to the edgeless network
security where the trade-off between privacy and data
utility is minimized.
REFERENCES
Ahmed, Ammar; Ogalo, Habil Slade. (2019). From HRM
to E-HRM: Contemporary developments from
scholarly work. Annals of Contemporary Developments
in Management & HR (ACDMHR), 1, 1-6.
Alagic, Gorjan; Dulek, Yfke; Schaffner, Christian;
Speelman, Florian. (2017). Quantum Fully
Homomorphic Encryption With Verification.
arXiv:1708.09156, Cornell University.
Bellafqira, Reda; Coatrieux, Gouenou; Bouslimi, Dalel;
Quellec, Gwenole; Cozic, Michel;. (2017). Proxy Re-
Encryption Based on Homomorphic Encryption. The
33rd Annual Computer Security Applications
Conference. Seoul, Korea.
Bienias, P., Warzyński, A., & Kołaczek, G. (2020).
Application and preliminary evaluation of Anontool
applied in the anomaly detection module. IEEE 29th
International Conference on Enabling Technologies:
Infrastructure for Collaborative Enterprises (WETICE)
(pp. 119-123). Bayonne: IEEE. doi:10.1109/
WETICE49692.2020.00031
Catalano, Dario; Fiore, Dario;. (2014). Boosting Linearly-
Homomorphic Encryption to Evaluate Degree-2
Functions on Encrypted Data. cryptoeprint:2014/813.
Retrieved from https://ia.cr/2014/813
Cheon, Jung Hee; Kim, Jinsu. (2015). A Hybrid Scheme of
Public-Key Encryption and Somewhat Homomorphic
Encryption. IEEE Transactions on Information
Forensics and Security, 10(5), 1052 - 1063.
Coppolino, L., D’Antonio, S., Formicola, V., Mazzeo, G.,
& Romano, L. (2021). VISE: Combining Intel SGX and
Homomorphic Encryption for Cloud Industrial Control
Systems. IEEE Transactions on Computers, 70(5), 711
- 724.
Dyer, James; Dyer, Martin; Xu, Jie. (2017). Practical
Homomorphic Encryption Over the Integers.
arXiv:1702.07588, Cornell University.
Heartfield, Ryan; Loukas, George. (2016). A Taxonomy of
Attacks and a Survey of Defence Mechanisms for
Semantic Social Engineering Attacks. ACM Computing
Surveys, 48(3), 1–39. doi:10.1145/2835375
Jin, Xin; Zhang, Hongyu; Li, Xiaodong; Yu, Haoyang; Liu,
Beisheng; Xie, Shujiang; Singh, Amit Kumar; Li,
Yujie. (2021). Confused-Modulo-Projection-Based
Somewhat Homomorphic Encryption—Cryptosystem,
Library, and Applications on Secure Smart Cities. IEEE
Internet of Things Journal, 8(8), 6324-6336.
Kim, Myungsun; Lee, Hyung Tae; Ling, San; Meng Tan,
Benjamin Hong; Wang, Huaxiong. (2019). Private
Compound Wildcard Queries Using Fully