技术视角下网络空间信任体系模型及发展研究
Model and Development of Cyberspace Trust System from a Technical Perspective
随着网络空间的边界不断扩张,由信任缺失引发的安全事件逐年增加,网络空间信任体系面临严峻挑战,目前研究多聚焦于宏观政策研判及信任模型的应用探索,对可信发展需求与特征要素的系统性探究相对不足。为此,本文首先梳理了世界各国网络空间信任的政策演进过程,分析了信任体系模型发展需求。在此基础上,从通信层、网络层、系统层、应用层构成的网络空间技术体系出发,逐层剖析各层面临的信任问题及应对技术,提出一种基于技术视角的网络空间信任体系模型框架,凝练出网络空间信任应具备的五大核心功能特征:身份认证、授权管理、责任认定、数据可信、供应链与服务可信。为进一步验证模型的适用性,选取了极端条件下网络空间、大模型、数据流通及车联网四个典型场景,深入分析信任风险与关键技术的应对路径。最后,提出构建我国网络空间可信生态的发展建议,为相关政策制定与技术架构设计提供理论支撑。
With the continuous expansion of cyberspace boundaries, trust-related security incidents are increasing annually, posing severe challenges to the cyberspace trust system. However, current research mostly focuses on macro-policy analysis and the application exploration of specific trust models, with insufficient systematic exploration of the developmental requirements and characteristic elements of trustworthiness. To address this gap, this study reviews the policy evolution trajectories of cyberspace trust frameworks across nations, analyzing the developmental demand for trust system models. Subsequently, we propose a model framework for the cyberspace trust system from a technical perspective, grounded in the cyberspace technological architecture comprising the communication, network, system, and application layers. Through a layer-by-layer analysis of trust challenges and corresponding mitigation techniques, the study further identifies five core functional characteristics essential for cyberspace trust: identity authentication, authorization management, accountability, data trustworthiness, and supply chain and service trustworthiness. To validate the model's applicability, we conduct an in-depth analysis of trust risks and key technical countermeasures across four representative scenarios: extreme-condition cyberspace, artificial intelligence, data flows, and the Internet of Vehicles. Furthermore, recommendations are proposed to support the development of China's trustworthy cyberspace ecosystem, providing theoretical foundations for policy formulation and technical architecture design.
网络空间信任体系 / 技术模型 / 核心功能特征 / 零信任 / 场景验证
cyberspace trust system / technical model / core functional characteristics / zero trust / scenario validation
| [1] |
Syuntyurenko O V, Gilyarevskii R S. Trends and risks of network technologies [J]. Scientific and Technical Information Processing, 2021, 48(2): 97‒106. |
| [2] |
Azevedo A C, Scheid E J, Franco M F, et al. Assessing SSL/TLS certificate centralization: Implications for digital sovereignty [EB/OL]. (2025-04-24)[2025-07-12]. https://arxiv.org/abs/2504.16897. |
| [3] |
何良生. 密码是构建网络信任体系的基石 [J]. 中国信息安全, 2021 (5): 58‒60. |
| [4] |
He L S. Password is the cornerstone of building a network trust system [J]. China Infornation Security, 2021 (5): 58‒60. |
| [5] |
International Electrotechnical Commission. Industrial communication networks ‒ Fieldbus specifications ‒ Part 1: Overview and guidance for the IEC 61158 and IEC 61784 series: IEC 61158-1: 2023 [S]. Geneva: IEC, 2023. |
| [6] |
ISO/IEC. Information technology — Cybersecurity — Overview and concepts: ISO/IEC TS 27100: 2020 [S]. Geneva: ISO/IEC, 2020. |
| [7] |
尹一桦, 帅军军. 数字信任体系研究 [J]. 信息安全与通信保密, 2023, 21(9): 96‒105. |
| [8] |
Yin Y H, Shuai J J. Research on digital trust system [J]. Information Security and Communications Privacy, 2023, 21(9): 96‒105. |
| [9] |
姜丽敏, 丁宇征, 李金戈, 对零信任的网络安全防护体系的研究与分析 [J]. 网络安全技术与应用, 2024 (7): 1‒2. |
| [10] |
Jiang L M, Ding Y Z, Li J G, et al. Research and analysis of network security protection system with zero trust [J]. Network Security Technology & Application, 2024 (7): 1‒2. |
| [11] |
徐华林. 基于零信任安全体系的网络安全技术架构研究 [J]. 网络安全和信息化, 2025 (4): 34‒36. |
| [12] |
Xu H L. Research on network security technology architecture based on zero trust security system [J]. Cybersecurity & Informatization, 2025 (4): 34‒36. |
| [13] |
周吉, 房冬丽, 丁文超, 基于零信任的网络信任体系安全性评估技术 [J]. 网络安全技术与应用, 2025 (6): 18‒22. |
| [14] |
Zhou J, Fang D L, Ding W C, et al. Security evaluation technology of network trust system based on zero trust [J]. Network Security Technology & Application, 2025 (6): 18‒22. |
| [15] |
严霄凤. 关于国家网络信任体系建设的思考 [J]. 信息安全与技术, 2011, 2(4): 3‒4, 7. |
| [16] |
Yan X F. Thinking of constructing the national network trust system [J]. Information Security and Technology, 2011, 2(4): 3‒4, 7. |
| [17] |
张立武. 网络信任体系发展趋势研究 [J]. 信息网络安全, 2011, 11(7): 69‒71, 78. |
| [18] |
Zhang L W. Development trends of network trust system [J]. Netinfo Security, 2011, 11(7): 69‒71, 78. |
| [19] |
陈远, 邱均平, 邹晶, 对我国网络社区信息传播管理法规的思考 [J]. 山东社会科学, 2008 (5): 32‒37. |
| [20] |
Chen Y, Qiu J P, Zou J, et al. Reflections on the management regulations of information dissemination in online communities in China [J]. Shandong Social Sciences, 2008 (5): 32‒37. |
| [21] |
Grant J A. The national strategy for trusted identities in cyberspace: Enhancing online choice, efficiency, security, and privacy through standards [J]. IEEE Internet Computing, 2011, 15(6): 80‒84. |
| [22] |
Rose W, Borchert O, Mitchell S, et al. Zero trust architecture [R]. Gaithersburg: National Institute of Standards and Technology, 2020. |
| [23] |
郝志超, 张依梦. 联邦零信任战略(译文) [J]. 信息安全与通信保密, 2022, 20(4): 44‒51. |
| [24] |
Hao Z C, Zhang Y M. Federal zero trust strategy [J]. Information Security and Communications Privacy, 2022, 20(4): 44‒51. |
| [25] |
许蔓舒. 以技术、政治和国际治理视角反思网络公开溯源 [J]. 中国信息安全, 2022 (5): 70‒74. |
| [26] |
Xu M S. Reflection on the source of network openness from the perspective of technology, politics and international governance [J]. China Information Security, 2022 (5): 70‒74. |
| [27] |
徐莉, 陈倩. 美国《国防部零信任参考架构》解读 [J]. 信息安全与通信保密, 2022, 20(1): 38‒44. |
| [28] |
Xu L, Chen Q. Interpretation of U.S. DoD zero trust reference architecture [J]. Information Security and Communications Privacy, 2022, 20(1): 38‒44. |
| [29] |
付国晴, 贾儒鹏, 吕玮. 2023年网络安全热点技术领域全景扫描 [J]. 信息安全与通信保密, 2024, 22(1): 16‒25. |
| [30] |
Fu G Q, Jia R P, Lyu W. Overview of cyber security technology hotspots in 2023 [J]. Information Security and Communications Privacy, 2024, 22(1): 16‒25. |
| [31] |
Department of Defense Office of Prepubucation and Security Review. DoD zero trust strategy [R]. Washington, DC: Department of Defense, 2022. |
| [32] |
中国国家标准化管理委员会. 信息安全技术 可信计算规范 可信软件基: GB/T 37935—2019 [S]. 北京: 中国国家标准化管理委员会, 2019. |
| [33] |
National Standardization Administration Committee. Information security technology─Trusted computing specifications─Trusted software base: GB/T 37935—2019 [S]. Beijing: National Standardization Administration Committee, 2019. |
| [34] |
中国国家标准化管理委员会. GB/T 38638—2020信息安全技术 可信计算 可信计算体系结构 [EB/OL]. (2020-04-28)[2025-07-12]. https://openstd.samr.gov.cn/bzgk/gb/newGbInfo?hcno=76B0E3C2D7898AF1DDB00E01C2DA88B0. |
| [35] |
National Standardization Administration Committee. GB/T 38638—2020 Information security technology trusted computing trusted computing architecture [EB/OL]. (2020-04-28)[2025-07-12]. https://openstd.samr.gov.cn/bzgk/gb/newGbInfo?hcno=76B0E3C2D7898AF1DDB00E01C2DA88B0. |
| [36] |
国家标准化管理委员会. GB/T 38644—2020信息安全技术 可信计算 可信连接测试方法 [EB/OL]. (2020-04-28)[2025-07-12]. https://openstd.samr.gov.cn/bzgk/gb/newGbInfo?hcno=313886B1D7FDCD5FFAEECAA4C6417A52. |
| [37] |
National Standardization Administration Committee. GB/T 38644—2020 Information security technology trusted computing trusted connection test methods [EB/OL]. (2020-04-28)[2025-07-12]. https://openstd.samr.gov.cn/bzgk/gb/newGbInfo?hcno=313886B1D7FDCD5FFAEECAA4C6417A52. |
| [38] |
国家标准化管理委员会. GB/T 43696—2024网络安全技术 零信任参考体系架构 [EB/OL]. (2024-04-25)[2025-07-12].https://openstd.samr.gov.cn/bzgk/std/newGbInfo?hcno=C166002FE253A840E56BEBF13B4945E7. |
| [39] |
National Standardization Administration Committee. GB/T 43696—2024 network security technology zero trust reference architecture [EB/OL]. (2024-04-25)[2025-07-12].https://openstd.samr.gov.cn/bzgk/std/newGbInfo?hcno=C166002FE253A840E56BEBF13B4945E7. |
| [40] |
张宇光, 胡影. 2019年数据安全国际动态综述 [J]. 保密科学技术, 2019 (12): 32‒35. |
| [41] |
Zhang Y G, Hu Y. Summary of international trends of data security in 2019 [J]. Secrecy Science and Technology, 2019 (12): 32‒35. |
| [42] |
European Commission. Implementing regulation on the adoption of a European Common Criteria-based cybersecurity certification scheme [EB/OL]. (2024-01-31)[2025-07-12]. https://digital-strategy.ec.europa.eu/en/library/implementing-regulation-adoption-european-common-criteria-based-cybersecurity-certification-scheme. |
| [43] |
Information-technology Promotion Agency. Japan cyber star (jc-star) [EB/OL]. (2024-09-30)[2025-07-12].https://www.ipa.go.jp/en/security/jc-star/index.html. |
| [44] |
Falowo O I, Popoola S, Riep J, et al. Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents [J]. IEEE Access, 2022, 10: 134038‒134051. |
| [45] |
刘泽刚. 人工智能时代数字公民身份构建的要点、基点与难点 [J]. 法学评论, 2024, 42(5): 105‒119. |
| [46] |
Liu Z G. Essense, basics and difficulties of constructing digital citizenship in the era of artificial intelligence [J]. Law Review, 2024, 42(5): 105‒119. |
| [47] |
孙帅, 张蕾, 胡春卉, 多视角下的网络空间安全模型与体系化发展 [J]. 中国工程科学, 2023, 25(6): 116‒125. |
| [48] |
Sun S, Zhang L, Hu C H, et al. Cyberspace security models and systematic development from multiple perspectives [J]. Strategic Study of CAE, 2023, 25(6): 116‒125. |
| [49] |
Martínez J, Durán J M. Software supply chain attacks, a threat to global cybersecurity: SolarWinds' case study [J]. International Journal of Safety and Security Engineering, 2021, 11(5): 537‒545. |
| [50] |
安雨康. 黎巴嫩寻呼机爆炸事件击穿全球供应链信任 [J]. 世界知识, 2024 (20): 48‒50. |
| [51] |
An Y K. Lebanon pager explosion breaks trust in global supply chain [J]. World Affairs, 2024 (20): 48‒50. |
| [52] |
徐恪, 凌思通, 李琦, 基于区块链的网络安全体系结构与关键技术研究进展 [J]. 计算机学报, 2021, 44(1): 55‒83. |
| [53] |
Xu K, Ling S T, Li Q, et al. Research progress of network security architecture and key technologies based on blockchain [J]. Chinese Journal of Computers, 2021, 44(1): 55‒83. |
| [54] |
张宾, 张宇, 张伟哲, PKI技术研究与进展 [J]. 软件学报, 2025, 36(6): 2875‒2899. |
| [55] |
Zhang B, Zhang Y, Zhang W Z, et al. Research and progress of PKI technology [J]. Journal of Software, 2025, 36(6): 2875‒2899. |
| [56] |
刘晗, 李凯旋, 陈仪香. 人工智能系统可信性度量评估研究综述 [J]. 软件学报, 2023, 34(8): 3774‒3792. |
| [57] |
Liu H, Li K X, Chen Y X. Survey on trustworthiness measurement for artificial intelligence systems [J]. Journal of Software, 2023, 34(8): 3774‒3792. |
| [58] |
张海霞, 刘文杰, 薛彤, 基于车辆行为分析的车联网超可靠低时延通信关键技术 [J]. 中兴通讯技术, 2020, 26(1): 12‒18. |
| [59] |
Zhang H X, Liu W J, Xue T, et al. Vehicle behavior analysis based ultra-reliable and low-latency communication technologies for Internet of vehicles [J]. ZTE Technology Journal, 2020, 26(1): 12‒18. |
| [60] |
章嘉彦, 李飞, 李如翔, V2X通信中基于椭圆曲线加密算法的身份认证研究 [J]. 汽车工程, 2020, 42(1): 27‒32. |
| [61] |
Zhang J Y, Li F, Li R X, et al. Research on identity authentication in V2X communications based on elliptic curve encryption algorithm [J]. Automotive Engineering, 2020, 42(1): 27‒32. |
| [62] |
刘召曼, 杨亚芳, 宁建廷, 基于新型可净化多重签名的车联网高效假名证书分发方案 [J]. 通信学报, 2024, 45(11): 27‒45. |
| [63] |
Liu Z M, Yang Y F, Ning J T, et al. Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature [J]. Journal on Communications, 2024, 45(11): 27‒45. |
| [64] |
陆忠梅, 陈巍, 魏杰, 车联网极低时延与高可靠通信: 现状与展望 [J]. 信号处理, 2019, 35(11): 1773‒1783. |
| [65] |
Lu Z M, Chen W, Wei J, et al. Current situation and prospect of V2X with ultra-reliable and low-latency [J]. Journal of Signal Processing, 2019, 35(11): 1773‒1783. |
/
| 〈 |
|
〉 |