

ZERO TRUST ARCHITECTURE: A PARADIGM SHIFT IN CYBERSECURITY FOR THE CLOUD-DRIVEN ERA
Abstract
With the rapid adoption of cloud computing, remote work, and Internet of Things (IoT) devices, traditional perimeter-based security models are no longer sufficient to safeguard enterprise networks. Zero Trust Architecture (ZTA) introduces a modern security paradigm based on the principle of “never trust, always verify,” enforcing continuous authentication, micro-segmentation, and strict access controls. This paper provides a comprehensive survey of ZTA, including its core principles, architectural components, deployment models, and real-world applications. We critically analyze existing frameworks such as the NIST Zero Trust model and Google BeyondCorp, evaluating their strengths and weaknesses against evolving cyber threats. The paper also highlights implementation challenges and proposes future research directions, including AI-driven access control, blockchain-based identity validation, and ZTA integration for 5G and IoT ecosystems.
References
NIST, Zero Trust Architecture, Special Publication 800-207, Aug. 2020. [Online]. Available: https://doi.org/10.6028/NIST.SP.800-207
J. Kindervag, “Build Security Into Your Network's DNA: The Zero Trust Network Architecture,” Forrester Research, 2010.
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, 2020.
A. Khan, M. Alam, and J. Moura, “Zero Trust Security for Cloud and IoT: Principles and Challenges,” IEEE Access, vol. 10, pp. 56321–56338, 2022.
P. A. Grimes, “Implementing a Zero Trust Security Model,” SANS Institute InfoSec Reading Room, 2021.
R. Chandramouli and S. Rose, “Zero Trust Architecture and Security Challenges in Edge and IoT,” IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4343–4354, Mar. 2022.
J. Zhang and L. Wang, “Blockchain-based Access Control in Zero Trust Networks,” Future Generation Computer Systems, vol. 127, pp. 34–48, 2022.
A. Sharma, S. K. Singh, and R. Buyya, “Securing 5G and IoT Networks Using Zero Trust Principles,” IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1685–1709, 2022.
C. DeCusatis, “Microsegmentation and Zero Trust Architecture for Cloud Security,” IBM Journal of Research and Development, vol. 64, no. 2/3, pp. 7:1–7:12, 2020.
M. Ferrag and L. Maglaras, “Deep Learning for Anomaly Detection in Zero Trust Networks,” IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 2812–2825, Sept. 2021.
Refbacks
- There are currently no refbacks.