Zero Trust in the Cloud: A Comprehensive Review of Data Breach and Network Attack Prevention

Authors

  • Shagufta Shakeel Department of Computer Science and Engineering, MMMUT, Gorakhpur, UP, 273001, India Author
  • Sushil Kumar Saroj Department of Computer Science and Engineering, MMMUT, Gorakhpur, UP, 273001, India Author
  • Nida Shakeel Department of Information Technology and Computer Application, MMMUT, Gorakhpur. UP, 273001, India Author

DOI:

https://doi.org/10.47392/IRJAEH.2024.0326

Keywords:

Zero Trust Architecture, Trust Models, Cloud Security, Cloud Computing, Blockchain

Abstract

Over the past three decades, the world of computation has evolved from centralized to distributed systems, returning to virtual centralization in Cloud Computing. The location of data and processes significantly impacts computation, with cloud computing allowing vendors to provide services and data maintenance, leaving the client unaware of the processes running or data storage. This raises concerns about data security in cloud computing. The increasing frequency of cross-border access has made traditional perimeter-based network security models insufficient. The rise of new threats and attacks in the digital world necessitates reliable and secure methods for information processing, data storage, and network transport. Zero Trust (ZT) is a developing network safety model that focuses on clients, resources, and assets, using zero-trust concepts to design modern frameworks and work processes. Since zero-trust architecture is still a relatively young field of study, a lot of papers have been published on it in the previous few years. This paper lists and evaluates a few relevant research publications about blockchain technology and the Zero Trust Architecture. The emphasis is on documents that use the zero-trust security mechanism and blockchain-based zero-trust systems. This research aims to contribute to the ongoing discussion on effective ways to protect advanced frameworks in the interconnected world, helping professionals and network safety experts. The paper provides an in-depth analysis of the zero-trust model, its concept, and applications, and proposes suggestions for organizations embracing this methodology. By examining recent research, the advantages, disadvantages, and potential uses of zero-trust security are determined by examining the significant parts of the zero-trust structure and their coordination across various domains.

Downloads

Download data is not yet available.

Downloads

Published

2024-09-26

How to Cite

Zero Trust in the Cloud: A Comprehensive Review of Data Breach and Network Attack Prevention. (2024). International Research Journal on Advanced Engineering Hub (IRJAEH), 2(09), 2377-2384. https://doi.org/10.47392/IRJAEH.2024.0326

Similar Articles

1-10 of 118

You may also start an advanced similarity search for this article.