The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm

被引:1
作者
Bartakke, Jyoti [1 ]
Kashyap, Rajeshkumar [2 ]
机构
[1] Zeal Inst Business Adm Comp Applicat Res, Pune, India
[2] Sadhu Vaswani Inst Management Studies Girls, Pune, India
关键词
Zero-trust security; Cloud computing security challenges; Trust management; Zero-trust security approach; Zero trust benefits; Zero-trust security challenges;
D O I
10.31341/jios.48.1.8
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Zero -trust security is a security model that assumes no entity is implicitly trusted, regardless of its origin or scope of access. This approach requires continuous verification of all users, devices, and applications before granting access to resources. Cloud computing is a model for delivering IT resources and applications as a service over the Internet. Cloud computing offers many benefits, including scalability, agility, and cost savings. However, cloud computing also introduces new security challenges. This paper proposes a survey -based research methodology to evaluate the usage of clouds in zero -trust security strategies. The paper identifies different zero -trust security solutions, their key features, and the benefits and challenges of implementing these solutions in the cloud. The paper will also discuss the costs and benefits of different zero -trust security solutions. The findings of this research will be valuable for organizations that are considering implementing a zero -trust security strategy in the cloud. The paper will provide guidance on how to choose the best zero -trust security solution for organizational needs and how to implement it effectively.
引用
收藏
页码:149 / 165
页数:17
相关论文
共 19 条
[1]  
Abbadi Imad M., 2011, Information Security Technical Report, V16, P108, DOI 10.1016/j.istr.2011.08.006
[2]  
Archana P, 2014, International Journal of Computer Applications, V108, P1
[3]   Trust evaluation model of cloud user based on behavior data [J].
Chen, Zhenguo ;
Tian, Liqin ;
Lin, Chuang .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (05)
[4]  
Chiregi Matin, 2018, Journal of Electrical Systems and Information Technology, V5, P608, DOI 10.1016/j.jesit.2017.09.001
[5]  
Gilman even, 2017, PREPRINT
[6]  
Horvath A.S., 2015, PREPRINT, DOI [10.1109/secon.2015.7132885, DOI 10.1109/SECON.2015.7132885]
[7]   A Method for Trust Quantification in Cloud Computing Environments [J].
Li, Xiaohui ;
He, Jingsha ;
Zhao, Bin ;
Fang, Jing ;
Zhang, Yixuan ;
Liang, Hongxing .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
[8]   Establishing a Zero Trust Strategy in Cloud Computing Environment [J].
Mehraj, Saima ;
Banday, M. Tariq .
2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, :248-+
[9]  
Prakash P., 2018, INT C INT DAT COMM T, P1345, DOI [10.1007/978-3-030-03146-6 157, DOI 10.1007/978-3-030-03146-6157]
[10]   A Comprehensive Survey on Security in Cloud Computing [J].
Ramachandra, Gururaj ;
Iftikhar, Mohsin ;
Khan, Farrukh Aslam .
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 :465-472