Abstract
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well as an assessment of the many strategies and possibilities for effective implementation. The survey begins by examining the role of authentication and access control within Zero Trust Architectures, and subsequently investigates innovative authentication, as well as access control solutions across different scenarios. It more deeply explores traditional techniques for encryption, micro-segmentation, and security automation, emphasizing their importance in achieving a secure Zero Trust environment. Zero Trust Architecture is explained in brief, along with the Taxonomy of Zero Trust Network Features. This review article provides useful insights into the Zero Trust paradigm, its approaches, problems, and future research objectives for scholars, practitioners, and policymakers. This survey contributes to the growth and implementation of secure network architectures in critical infrastructures by developing a deeper knowledge of Zero Trust.
Keywords: authentication, zero trust (ZT), cloud computing, network security, blockchain
1. Introduction
The issue of information security has become increasingly difficult as information technology has continued to advance and find practical applications since the inception of the digital age. The prevalence and intensity of attacks related to cyber-security on networks has risen significantly in recent years. Even medium-sized business data centres can experience more than 100,000 security attacks each day. These attacks can be carried out by a variety of opponents, from solitary hackers to organized cyber-gangs. Their goals may include compromising essential network resources that include software-defined networks or Domain Name Servers, potentially jeopardizing their integrity and functionality [1]. As telecommuting and digital transformation gain traction, traditional company boundaries have diminished, removing digital boundaries entirely. As a result, the growing need for remote access has outpaced the capabilities offered by conventional perimeter safety measures. As a result of this trend, various businesses have been forced to reconsider their approach to network security. As a result, a concept known as Zero Trust Architecture has arisen, concentrating on resource security rather than just on perimeters of network. The security posture of a resource is no longer primarily governed by its network location under this approach [2].
Zero Trust Architecture research is now in its early stages, with a primary focus on the framework itself, access control, algorithms of trust evaluation, and identity authentication. These are the primary study domains within the Zero Trust field. Hence, the goal of this research is to provide a complete overview of the current research state in Zero Trust Architecture development, with a focus on four major topics. It covers the primary obstacles encountered in each discipline and investigates potential pathways for future study to successfully address these issues. Figure 1 depicts the work flow of the research article emphasising the interconnections and relationships among different aspects of the conducted analysis.
Our paper contributes significantly in the following ways:
-
(i)
We present a thorough examination of the current state of Zero Trust (ZT) research. We currently focus on the state of research in Zero Trust Architecture framework, access control, evaluation methods, and trust identity authentication. We provide a full knowledge of the general picture of Zero Trust research.
-
(ii)
We compare the most commonly used ZT approaches, provides Zero Trust Architecture (ZTA). The comparison of Conventional vs. ZT Security Model is also performed. We provide a comprehensive comparative assessment of various approaches by exploring their relative advantages and significant obstacles.
-
(iii)
We summarise the key issues faced by these sectors based on the strengths and shortcomings observed in existing Zero Trust network approaches. In addition, we propose critical research directions for the development of zero-trust systems that solve the stated difficulties.
The structure of the paper is organized as: ZTA is introduced in Section 2. Section 3 examines the current state of research on Zero Trust, especially ZT control as well as trust evaluation techniques. In Section 4, we describe the prevailing status of the major systems, compare them, and discuss potential future study options. Finally, we conclude this paper.
1.1. Background Study
Even before it was formally referred to as “zero trust,” the notion of ZT was deeply embedded in cyber-security practices. Early breakthroughs in this field included the establishment of the “black core” plan by the Defence Information Systems Agency and the Department of Defence, which attempted to improve enterprise security by changing the focus from perimeter-based protection to safeguarding individual transactions. The Jericho Forum popularized the concept of de-perimeterization in 2004, which entailed minimizing reliance on implicit confidence based purely on network location and recognising the difficulties of depending on single, static defences across a large network segment. De-perimeterization evolved and improved over time, eventually leading to the broader idea known as Zero Trust. John Kindervag coined the phrase “zero trust” while working at Forrester [3]. It soon became a popular phrase for a variety of cyber-security solutions that moved away from relying on implied trust derived from network location and instead prioritized evaluating trust on a transaction-by-transaction basis. Both the corporate sector and higher education institutions have moved away from perimeter-based security and towards ZT security methods. For more than a decade, federal agencies have been encouraged to adopt and implement Zero Trust safety practices. A number of initiatives and policies, including the Federal Information the Trusted Internet Connections, Security Modernization Act, Credential, and Access Management, the Identity based on federalism, and the Continuous Diagnostics and Mitigation programmes, have been established to limit data and resource access to authorized entities [4]. These programmes initially faced restrictions due to the technological limits of information based systems. Safety rules were primarily invariable and imposed at significant “choke points” that organizations could control, with the goal of having greatest impact with the least amount of work. However, as technology has improved, it is now possible to analyse as well as measure access requests in a dynamic and granular manner, based on the idea of “need to access”. This method aids in the reduction of data exposure caused by compromised accounts, network surveillance by attackers, and other security threats. Many researchers have discussed the ZT frame work like Sarkar, Sirshak et al., in which domain-specific issues around cloud computing networks including ZT have been discussed [5]. In this article, challenges associated with cloud platforms only and necessities for transferring to ZTA have been elaborated; unlike in the presented article, we have considered all the applications like cloud computing, blockchain, edge computing, wireless networks, web3 and machine learning that have been incorporated. In this paper, in spite of choosing only specific area like cloud computing, challenges around broader areas have been discussed and reviewed corresponding to various techniques used. The taxonomy of the ZT framework also elaborated in this article.
1.2. Elements of Zero Trust
A few elements of ZT are identified and mentioned below:
1.2.1. Implicit Trust Region
It is critical to assume that possible attackers are present within the company network. As a result, all actions involving assets should prioritize security by implementing safeguards such as authentication for all connections and communication encryption.
1.2.2. Bring-Your-Own-Device Policies
The organization employs BYOD policies to accommodate guests, contracted services, and enterprise subjects who use personal devices. When appropriate, this policy allows users to access enterprise resources using non-business-owned equipment.
1.2.3. Security Policy
When moving assets and workloads between enterprise-owned infrastructure and other environments, security must be maintained. Devices such as distant users migrating from business networks to non-enterprise networks, as well as applications shifting across local data centres to non-enterprise cloud scenarios, fall under this category. Enterprise-owned devices may feature artifacts that strengthen authentication and provide a higher level of confidence as compared to non-enterprise devices. It is insufficient to rely exclusively on subject credentials for device authentication in order to access enterprise resources [6].
1.2.4. Assumption of Untrusted Local Network
Remote enterprise topics and assets must assume that their local network connections are untrustworthy. It is critical for remote subjects to anticipate that the local network, which is not owned by the firm, may be hostile. All traffic should be regarded as potentially watched and tampered with by assets. To reduce risks, all connection requests should go through authentication and authorization processes, and communications should be as secure as feasible. This includes assuring the secrecy, integrity, and source authentication of all communications [7].
1.2.5. Less Enterprise-Owned Infrastructure
The resource landscape includes enterprise issues including some cloud based services. In some circumstances, enterprise-owned entities may require accessibility of the local network for providing some network functions and essential connectivity such as DNS resolution.
1.2.6. Multi-Factor Authentication
Implement a system that requires users to produce numerous forms of identification before allowing access. MFV improves security by introducing additional stages of authentication, lowering the chance of un-authorized access due to compromised credentials. This strategy requires attackers to circumvent numerous authentication obstacles [8].
1.2.7. Context-Responsive Access Controls
Few access decisions based on contextual data like device status, user roles, position, and potential risk factors. Access controls can dynamically adjust to provide suitable levels of security by taking into account the present situation and prospective threats or vulnerabilities. This ensures that access is provided or refused based on the context, hence improving overall security [8].
1.2.8. Continuous Monitoring and Validation
Maintain real-time monitoring of user actions, health of gadgets, and application behaviour to identify the possible threats or abnormalities as soon as possible. Validate the effectiveness of security controls, rules, and configurations on a regular basis to verify they are still capable of dealing with developing threats [9].
1.2.9. Data Protection Secure
Implement strong encryption, tokenization, and other data protection mechanisms to safeguard sensitive data during storage, transport, and processing. To prevent unauthorized access to sensitive information, establish strict access controls and deploy comprehensive monitoring procedures.
1.2.10. User and Entity Behaviour Analytics
Use advanced analytics to analyse user and object behaviour, discovering patterns and detecting abnormalities that could signal possible threats or malicious activity. User and entity behaviour analysis help to respond to potential security concerns in organizations proactively [10].
1.2.11. Absence of a Fallacious Perception of Security
The belief that an organization’s employees have undergone initial security screenings is insfficient as a criterion for establishing trust or identifying breaches. It is imperative to hold individuals accountable for their integrity and acknowledge that people may not always adhere to security policies, thereby challenging the validation of trust.
Nevertheless, the Zero Trust model elucidates this notion by implementing an architecture that safeguards against potential insider threats that may go unnoticed. As individuals become acquainted with an organisation or network, they are inclined to recognise the vulnerabilities inside the network boundaries. Insiders, possessing a fundamental understanding of the system design, might pose a greater threat in the event of a security breach due to their awareness of the existing flaws. Therefore, the approach is constructed based on a Zero Trust mindset, necessitating ongoing verification of credentials regardless of the individual involved [11].
1.3. Zero Trust Architecture
ZT is a cyber-security concept that prioritizes protection of resources and relies on the grounds that trust should never be presumed but should be constantly reviewed. Identity management, credentials, access management, operational procedures, endpoints, hostile surroundings, and the basic infrastructure are all covered by ZTA. Initially, the emphasis is on limiting resource access to only those with a legitimate need, allowing them only the privileges necessary to complete their jobs (e.g., read, write, delete). Within an organization, a ZTA deployment comprises of various logical connected components that can be implemented as an on-premises service or as a cloud-based service [12]. Figure 1 displays the framework model, which depicts the relationship among these components and their inter linkage. It is vital to remember that this model is an idealized representation of the logical components and their interconnections.
The logical components of a ZTA operate in distinct control and data planes. The Policy Engine is leader of determining resource access based on company policies and external inputs, using a trust algorithm. It collaborates closely with the Policy Administrator (PA) component, which puts the PE’s choices into action. The PA creates or terminates communication pathways between subjects and resources, generates session-specific authentication tokens or credentials, and configures the Policy Enforcement Point (PEP) as needed. Interlinking among subjects and corporate resources are enabled, monitored, and terminated by the Policy Enforcement Point (PEP). It works with the PA to inform requests and receive updates by policy. Although it is an individual logical component, it can be separated into two distinct components. Furthermore, various data sources contribute input and policy. In addition, various data sources supply the PE with input and policy rules for access decision-making [13]. Local and foreign data sources are included. Other important components of a ZT network are:
-
(i)
Continuous diagnostics and mitigation system: gathers information on the present state of enterprise assets and upgrades configuration and software components.
-
(ii)
Industry compliance system: ensures that the corporation is in conformity with essential authoritarian standards, such as healthcare, or financial diligence information based on requirements of security.
-
(iii)
Threat intelligence feed(s): information from internal or external sources that helps the policy engine make access choices.
-
(iv)
Records of network and system activity: combines records of asset operations, network congestion, resource access actions, and other activities to provide actual insights into enterprise data system security posture.
-
(v)
Data access policies: establish the rules and regulations that control access to enterprise resources.
-
(vi)
Enterprise public key infrastructure (PKI) system: generates and tracks certificates of enterprise generated for resources, subjects, services, and requisition [14].
-
(vii)
Identity management (ID) system: ID system generates, maintains, and controls corporate accounts of user and records based on their identity that include subject information, roles, access attributes, and allocated assets.
-
(viii)
Security information and event management system: SIEM gathers and accesses security-based data, allowing policy modification and alerting against potential attacks on organisational assets.
Figure 2 depicts the ZT network’s architecture, highlighting the relationships and interactions between different components.
1.4. Conventional vs. ZT Security Model
The perimeter (border) security model is the traditional safety paradigm which relies on the foundation of “trust but verify.” It relies on internal users who have passed system or network security functions while being vigilant against external threats. The ZT paradigm, on the other hand, does not presuppose a “trust zone”, and emphasizes verification without inherent trust, even for internal users. In contrast to the perimeter security approach, which lays stress primarily on choking, the ZT model prioritizes complete and ceaseless verification over simply denying access. Table 1 shows a comparison of the traditional security paradigm with the ZT approach.
Table 1.
Comparative Aspects | Conventional Security Model | Zero Trust Security Model |
---|---|---|
Trust of Stakeholders | They place their faith in internal stakeholders rather than external stakeholders. | Enables traffic to flow only among approved systems, irrespective of stakeholder. |
Environment Involves | They have faith in the environment but verify it. | They do not believe anything and double-check everything. |
Network Protocol | It uses network protocols for access control. | It employs data-centric control of access. |
Communication Channels | Only outward communication channels are encrypted, not internal channels. | Encryption is implemented on the two channels of the whole transmission. |
Authentication | Only the initial level of authentication is performed. | Continuous communication phase verification is performed. |
Protocols | It is made out of predetermined protocols and security standards. | It comprises customizable security rules and regulations that are evaluated on a regular basis. |
Management Approach | It employs a versatile security management approach. | It provides rigorous paradigms as well as a more advanced form of security monitoring. |
2. Literature Review
Sultana et al. [15] presented a safe medical image allocation platform based on ZT concepts and technology of blockchain. This technology provides the complete security of sensitive medical data. The technology improves information security by utilizing blockchain. However, it is critical to examine the possible complexity and efficiency consequences of combining these technologies, and additional research is needed in this field. Ian and Song [16] suggested a ZT strategy based on the BIBA and BLP models. This method does thorough trust assessments for numerous system components. It emphasizes the importance of confidentiality and integrity and assigns different weights to achieve greater security. It does not, however, address the initial trust value assignment for entities such as users, terminals, environments, and objects, which could lead to human errors. Furthermore, the completeness and logic of the weight assignment list need to be investigated further. Dayna et al. suggested a ZT model specifically intended for cloud data centre networks in a separate study [17] for the creation of trust; their model blends identity management, packet-based authentication, and automated threat response. It controls the model’s eight different network trust levels dynamically.
Traditional network security measures that focus on basics a border between trustworthy and local networks are no longer viable, as cloud apps and IoT networks have become more commonly used. ZT architecture has emerged to meet the need for secure and intelligent access management in the absence of trusted networks or devices. To fulfil the particular security requirements of respective networks, researchers devised and implemented numerous variants of ZTA. Pedro Assuncao proposed a ZT architecture in [18] that eliminates unchanged credentials, uses multifaceted verification, and keeps a proper record of devices and network congestion. In the meantime, ref. [19] proposed a context-based ZT architecture access control system to address security issues in a heterogeneous Moodle application. This framework employs the Zero Trust concept to offer access control for the e-Learning platform Moodle, demonstrating positive webserver performance gains. However, additional tests are required to evaluate the Zero Trust model’s non-functional performance.
The ZT security framework that featured by continual verification of identity and minimal power distribution, is capable of meeting the safety control needs of various contemporary networked devices. A proposed system for access control and permission relies on the ZT security architecture. Individual identities and confidence from users are derived based on behaviour of users. The system utilizes real-time hierarchy oversight across many settings to effectively accomplish flexible and precise control of access and authentication.
Taxonomy of Zero Trust Network Features
Figure 3 depicts the way significant features in ZT networks are classified. These features are elaborated as follows:
Authentication: This feature is concerned with validating user credentials in order to distinguish legitimate users from bad actors attempting to obtain unauthorized access. To secure the identification of valid users and to protect devices and data from unauthorized access, robust authentication procedures are required [20].
A ZT network’s design policies include features, such as device access policies, architectural policies, frameworks, and automation. These policies guide the ZT networks’ implementation and operation.
Maturity levels: A ZT network’s maturity is classified into different levels as shown in Figure 2. The conventional level denotes the lack of a ZT implementation, whereas the advanced level denotes the partial implementation of a ZT model. The optimal level denotes complete automation and implementation of the ZT approach.
A continuous evaluation framework is a critical component of a ZT system. The module of trust evaluation analyses and assesses access requests using security data collected by the auxiliary platform, generating trust values. These trust values form the foundation of the authorization mechanism, allowing for dynamic and refined trust assessment.
Micro-segmentation: This method splits the system into small segments having their own security and access control policies set [21]. Micro-segmentation can prevent unapproved usage of crucial information or assets and limit the potential implications of a breach.
Access control: This is an essential prerequisite for ZTA, as it involves the capability to determine the privileges of a subject and subsequently limit access based on those privileges. The primary objective of logical access control is to safeguard resources, including information, components, and programmes by regulating the activities that a subject is permitted to perform on them [22].
In order to successfully execute a designated action on a specified entity, the individual must adhere to the established access control protocols. Specifically, if the prescribed policy requirements are met, permission to interact with the entity is granted.
Overall, these important elements contribute to a ZT network’s efficacy and security by guaranteeing robust authentication, well-defined design principles, incremental maturity levels, fine-grained access control evaluation, and the implementation of micro-segmentation for increased security.
3. Comparative Analysis of Zero Trust Network System
Zero Trust is a collection of established and new technologies, rather than a single, rigid design. It is critical to compare various technologies in order to identify which aspects have the greatest or worst fit. Table 2 represents the comparison between different approaches of ZT network based upon some significant parameters. Outdated designs can be changed with more effective ones as opponents progress. The model’s operational requirement takes precedence above its economic efficiency. Furthermore, writers have provided useful insights into how the majority of articles have primarily contributed to the framework design and strategy of ZT networks [23]. Such comparative metrics highlight the common key requirements identified across various cloud network implementations. Beneficiary node cooperation as a distinct group is crucial for network security in an unstable computer network environment. Given the critical necessity of resource security in cloud networks, determining the reliability of requests must rely on past data. Using different rules and standardized methods for the implementing restrictions of access for people in a fragmented network is not a novel approach. Creating a network’s restricted visibility buffer zone serves as the main network’s outer layer [24]. While unauthorized individuals may exploit weaknesses within this zone, attaining access to the network, which is secluded by a strong firewall, becomes hard and evident. Efficient network log keeping is critical, especially in cloud contexts [25]. Log storage in a standardized layout that could be processed by programmed software maximizes the prospective for proactive network security. Network devices must separate and route traffic relied on the association of the service within the organizational composition. Network segmentation improves network security by automating network defences against resource enumeration. Open source software has been a pillar of unrestricted participation in the development of software. Using open-source tools and software, which are freely available and changeable, allows government organizations and enterprises to customize and deploy technologies swiftly [26]. Because of the resource pooling and experience within open source groups, open source tools are normally more secure. Finally, consumer demand drives support for micro services. The packaging of full programmers or software suites improves efficiency and simplifies maintenance. These characteristics were chosen after reviewing the selected studies and reflect the common key criteria observed across numerous ZT network implementations [27].
Table 2.
As the fundamental basis for cloud platforms, ZT ought to encourage the reconsideration and reprioritization of existing end-user technologies. Biometric-based authentication approaches have been widely proposed, taking use of the uniqueness and persistence of human physiological characteristics to authenticate user identity. Kindervag et al. [37], to address the limitations of identity authentication, suggest leveraging devices and applications in android cellphones to accumulate fingerprint data. However, this approach is restricted to certain mobile phone models, resulting in incomplete coverage. To enhance security, it is crucial to move beyond single-factor authentication systems and explore improvements. A critical area that requires attention is the automated classification and detection of attack signature, which has long been identified as a crucial step towards bolstering cyber-security. An experimental testing ground demonstrating the usage of dynamic control plane feedback relied on observes, orient, and decide, Act architecture was provided in their study [38]. The test bed serves as a prototype for a ZT cloud networks. The trial findings given by the author coupled identity managing with threat response automatically and packet-based authentication with management of eight trust levels. Chen and Qiao designed a smart healthcare mechanism for 5G networks in [39], categorizing the system into four dimensions. In the context of ZT and cloud networks, these research initiatives emphasize the need of using biometric authentication, automating security responses, and utilizing machine learning for fine-grained access control. Table 3 represents the techniques used by different studies for implementing the ZT networks, including their advantages and disadvantages.
Table 3.
Ref. | Technique Used | Advantage | Disadvantage |
---|---|---|---|
[15] | Blockchain | Bringing blockchain and ZT together | Inadequate efficiency |
[16] | BLP and BIBA models | Assign various weights on the basis of the need for confidentiality and integrity. | The amount of weight proportion is not appropriate. |
[37] | DAN | Real-time data inspection and analysis | As the complexity of networks grows, so does user communication delay. |
[38] | Machine learning-based smart association models | API design, maintenance, and monitoring can all be made easier. | In the real world, this is difficult to achieve. |
[39] | Artificial intelligence for intelligent detection, | Increase the effectiveness of ZTA modules in interpreting large amounts of data. | Theoretical approach |
[40] | Zero Trust, 5G, Attribute-based Access Control | The framework used the ML and DL techniques to handle traffic monitoring, access control, auditing, and load matching, as well as trust evaluation and risk level to flexibly allow execution according to features. Significant organizational adjustments may be required. Adapting to decentralized settings | Relevant to the healthcare environment, and thus concentrated on access to resources instead of requirements for communication. |
[41] | Blockchain | Facilitate scalability | Overheads in computation and space |
[42] | ABAC, Hyper-Ledger Fabric | Fabric IoT implements ABAC via smart gateways and a hyper-ledger-based architecture. | The most significant drawback for fabric-IoT is scalability, paired with inadequate assistance for applications that use Internet of Things integration. |
[43] | NIST NGAC, ABAC access control | The proposed structure involves employing ABAC policies to secure IT devices by defining attributes for Network. | The system employs a collection predetermined policies, and no advance smart dynamic policies can be created at the time of execution to address a advance indeterminate condition. |
Because edge computing deployments are dynamic and shared, entities cannot be trusted indefinitely. It is becoming increasingly vital to incorporate ZT policies into (5G/6G) next-generation networks. This review underlines the problems and introduces the notion of intelligent Zero Trust Architecture as a security mechanism in un-trusted 5G/6G communication networks [38].Integrating smart appliances, sensors, and devices with the Internet of Things framework could result in a connected or smart environment [44]. These devices monitor physical environments, send data to a centralized database, and allow for advanced analytics. These IoT devices engage in device-to-device interactions while delivering services to various processes and applications, accessing subsets of device information and data. The receptive characteristics of this data can expose smart infrastructures to a plethora of cyber threats, possibly jeopardizing essential services and people’s lives. Enhanced procedures such as dynamic access control, enhanced network screening, and behavioural anomaly monitoring are required to secure smart settings. The emphasis on network security has altered as networks have switched from conventional in-house servers to remote cloud platforms. The norm has become reactive networks with low accountability and monitoring. Emerging technologies, such as Zero Trust network architecture, have changed the way cloud network security is approached [45]. No entity, regardless of origin or access scope, is implicitly trusted in ZT network access. Instead, the network rewards trustworthy behaviour and forecasts dangers proactively based on user behaviour. Web3, often known as the next-generation web, seeks to build a decentralized and user-controlled online environment [46]. However, it confronts energy consumption, regulatory compliance, interoperability, and scalability concerns. The use of AI technology in ZT network components has garnered little attention in the existing literature. The primary focus of this survey revolves around the utilization of AI technologies to automate and orchestrate components of ZT network architecture. The survey places particular emphasis on the seamless integration of AI-driven automation and orchestration. It is worth noting that edge computing plays a pivotal role in enabling cloud computing and information technology services to be delivered at the network’s edge [47]. The open architecture of cloud computing and network access at the edge, on the other hand, exposes various attack routes [48]. Table 4 represents the comparative analysis of ZT techniques used by different platform.
Table 4.
Platform | Applicability | Advantages | Disadvantages | Ref. |
---|---|---|---|---|
IoT | The Internet of Things in Healthcare Securing IoT devices with ZT, trust scores in ZT Campus Networks, supply chain management, context-based access control and and smart farming | Increased security in cloud computing settings for enterprises and prevents unauthorised fingerprinting of protected resources. Increase the efficiency of ZTA components in processing large amounts of data. | Identity-based access control and permission-based policies for iot device security, real-time environment monitoring and behaviour baseline development, i.e., improving policy enforcement points (PDP) decision-making in response to dynamic changes. |
[49,50,51] |
Cloud Computing | Empowering remote access and collaboration, making software and computing resources more convenient and efficiently available via internet-based solutions, seamless data storage and remote access, transforming communication and catalysing innovations. |
Ensuring the privacy of user data in location-based services, enhancing security and trust in identity authentication processes using the client-server model, assessing trustworthiness and improving security in dynamic environments using an analyzing cloud data plane performance under load and its impact on the control plane. | Cloud services with a limited user base, addressing cost and training issues, considerations for cybersecurity in decentralised systems, maintaining user trust and facilitating adoption, mitigating security risks and increasing system confidence. |
[45,52] |
Blockchain | Increasing knowledge and use of blockchain technology and cryptocurrencies, acceptance of bitcoin, ethereum, and defi platforms in mainstream markets, the nft boom and blockchain’s role in establishing unique ownership for artists, musicians, and content creators are revolutionising digital asset verification. | Cross-chain interoperability is improved, technologies that enhance privacy are provided, scalability and rapid rate of transactions are enabled, and latency is minimised. | Although the use of blockchain technology provides built-in safety benefits that include confidentiality and the use of encryption, it still remains necessary to make sure private data as well as additional confidential data is safeguarded in accordance with relevant privacy regulations. Additionally, computation and space operating costs must be discussed in order to achieve the optimal balance for optimum system performance. | [9,53,54,55] |
Edge Computing | Edge computing and its impending implementation in Sixth Generation (6G) mobile networks, as well as Multiple Edge Computing (MEC) in 5G, signal a shift in central computation and application deployment to the network’s edge. | Interoperability across platforms, safe multi-party computation, ultra-low latency time to response, differential privacy, and tremendous bandwidth. | Scalability limitations, as well as difficulties associated with decentralised trust structures, introduce platforms to new cyber threats. | [56,57,58] |
Mobile Netwok | Comprehensive enterprise mobile security, tool and technology suite to protect devices, data, and mobile applications, mobile operating system advances: contributing to improved security measures for mobile devices, enterprise mobility management: enabling effective mobile device and data control and security app security vetting and mobile application development: ensuring robust security measures for mobile applications. |
Using collaborative decentralised development and open-source software to promote innovation, collaboration, and data privacy protection, improved security in multiple dimensions-protecting users, terminals, and applications, identity security authentication continuous trust assessment, granular authorization mechanisms for improved security. |
The legal framework surrounding decentralised innovations continues to evolve, and novel regulations and laws run the danger of stifling innovation and restricting the possible advantages offered by these innovations. | [59,60] |
Wireless Network | Configuring restricted usage throughout all services and applications. Configuring auto-VPN for every user, which directs users through the right connection automatically. | It allows for safe virtualization. This will decrease the expense related to compliance as well as additional security audits. This will grow with the organisation plus novel ways for running enterprise, and it will make it simple to manage workloads. | Improving the precision and flexibility of rule creation to improve subjectivity, increasing evaluation efficiency, overcoming technical limitations, identifying solutions to improve overall performance and effectiveness. |
[61,62,63,64] |
Web3 | Getting ready for the Web3 era by improving user and device authentication in decentralized services and resources, securing remote access in Web3, implementing web3 zero-trust access controls. |
Boosting protection and safeguarding systems, reducing vulnerabilities and exposure to threats, decentralized identity management, automated security, enhancing authorization and permissions management for better access control, improving protection for cloud-based environments, scalable identity management. |
Smooth collaboration and interoperability through seamless integration with decentralized identity systems, adaptability to decentralized application environments. | [65,66,67,68] |
ML | Improving diagnoses and treatment plans through medical data processing, supply chain management transformation, tracking products, ensuring authenticity, and enabling transparency and security. |
Improving transparency and accountability, automation, using ai-powered algorithms to access data and analyze informed decisions to drive reality based scenario analysis. | Adapting to decentralized ecosystems may necessitate considerable organizational adjustments. | [39,69,70,71] |
This section outlines an analysis aimed at examining user perspectives on the usability and security aspects within the context of a zero trust framework. Table 5 balancing security and usability with Zero Trust. As efforts are made to enhance the security of systems, legitimate users may attempt to discover loopholes and devise alternative methods, leading to the compromising of security measures. The issue at hand has been acknowledged by scholars in the field of information privacy and accessibility research. However, progress in addressing this problem has been limited, mostly due to two key factors. Historically, the consideration of security and usability requirements for systems has often been relegated to a secondary position. The strategic plans for creating systems have failed to systematically address and integrate two crucial aspects: security and accessibility difficulties. These two causes have resulted in systems that are often not aligned in terms of privacy and accessibility.
Table 5.
Users | Model | Number of User Involved | Key Findings | Ref. |
---|---|---|---|---|
Non-expert users | Key-Directory Encryption Systems | 52-person | The study diverges from previous research, which mostly focused on tradeoffs related to user-interface design. The findings indicate that individuals possess a certain amount of comprehension regarding high-level security attributes and are capable of making rational trade-offs between these attributes and aspects such as convenience. | [72] |
Employee in the HR department of an enterprise | Contextual TA may send an alert system | 20 to 30 employee records | When creating and implementing trust algorithms, it is crucial to consider the equilibrium between security, usability, and cost-effectiveness. The repeated request for a subject to undergo reauthentication, in accordance with their mission function and organisational role, might result in usability challenges due to the alignment with historical patterns and established norms. | [4] |
Users of IS/IT services n five prominent US organisations across several industries | Developing value-based objectives | 35 experts | The goals provide a valuable foundation for evaluating the degree to which systems have achieved security and usability. The objectives additionally serve as a foundation for making decisions on the trade-off between security and usability. Computation and space operating costs must be discussed in order to achieve the optimal balance for optimum system performance. |
[73] |
Users of financial services industry | Single-factor and two-factor authentication in automated telephone banking | 62 telephone banking users | The objective of this study was to investigate user perspectives on the usability and security of single-factor and two-factor authentication techniques within the framework of an existing automated telephone banking service. The findings reveal notable disparities between the two authentication methods. These disparities, along with the preferences expressed by participants during the interview, can provide valuable insights for making informed decisions regarding the implementation of two-factor authentication. | [74] |
Internal security teams | User specific security policy through the formal modeling of user behavior | -- | One of the advantages of using a Zero Trust approach is the notable augmentation in the level of effort required by intruders to accomplish their goals. However, the implementation of Zero Trust will also result in heightened management complexity for internal security teams. These teams will require a mechanism for gathering data and implementing policy decisions based on analysis. The proposed procedure must be executed across all organisational systems and data, encompassing all access situations. | [75] |
4. Challenges, Solutions and Future Scope
The following are some of the challenges that are encountered in the field of Zero Trust:
Technology conjunction: ZT offers the groundwork for re-prioritizing existing end-user technologies and building a simplified approach that minimizes authentication delays while assuring business continuity. ZTA now integrates a number of technologies, including Security Information and event management, trust computation data analytics, file system permissions adjustment via active directory, and multi-factor authentication. These technologies interact with one another. However, there is still tremendous space for advancement and extension in the field of ZT cloud networks, with particular emphasis on the IoT and Block chains, 5G/6G Networks, edge computing and fog computing, and mobile networks.
Security protection capability: While the fundamental aspects of ZT have been developed, ensuring that varied technologies fulfil ZT requirements remains a difficult issue. Access control, identity authentication, and trust evaluation are still in the early stages of development in ZT networks. Future research should concentrate on leveraging these technologies to improve ZTA’s security protection capacity and practicability. Furthermore, deploying newly proposed ZT models to real-world enterprise network systems poses its own set of issues and is an active research topic.
Single-factor authentication: Single-factor authentication is vulnerable to total compromise if the factor, such as a password or biometrics, is stolen. Multifactor authentication, on the other hand, addresses the shortcomings of single-factor authentication while considerably reducing the potential of threat to the network. Even if an invader retrieves the password, acquiring authorization for the second or third factor becomes significantly more difficult. Incomplete authentication information, on the other hand, is insufficient for access. Beyond the initial one-time verification, constant authentication can transform the access information of the attackers. The transition from single-factor to multifactor authentication contributes to ongoing security advancements. ZTA, multifactor and continuous authentication methods are expected to be utilized more in the future. The goal is to minimize resource consumption throughout the authentication procedure while maintaining the ZT system’s security. This is consistent with the future of identity authentication in ZTA.
Complexity and computational cost: Because of the rising complexity and frequency of security assaults against businesses, access control systems must be adjusted according to the need, and assessment of risk must be included into control process. A range of criteria must be considered when making access control decisions, including user and device trust levels, the contextual environment, and the current level of security danger. Furthermore, the access permissions given to devices or people can change with time. In this scenario, risk-based access management is critical. The transition from traditional perimeter-based security models to ZT network security models treats both the workplace intranet as well as internet equally, emphasizing the absence of trust. Reducing authorization and establishing user authorization control that is dynamic are critical issues to address within the present model of ZT access control, which must not be constrained to a single control of access solution.
The continual enhancement of trust assessment comprehensiveness and subjectivity will be a consistent emphasis in future research. Within the scope of ZT theory, attempts are going to be made to increase the efficiency and precision of trust evaluation while considering the specific characteristics of various network environments. Adaptive modification is critical, considering device attributes, place, time, work type, and risk level of security in the environment. Furthermore, the access level allocated to devices or individuals can change over time. The access control standards might be capable of analysing the present degree of trust by utilizing several data sources for decisions making. As a result, access control based on risk should be applied in a range of domains. The underlying trend is a transition away from the old perimeter-based security paradigm and towards the implementation of the Zero Trust security framework, which treats both the workplace intranet and the internet with equal distrust. Within the ZT paradigm, addressing the difficulties of reducing authorization and enabling dynamic authorization control for users is critical. It is vital to stress that the present ZT access control framework be supposed to not be restricted to a single access control strategy, but rather encourage flexibility and adaptation to meet a variety of needs.
5. Conclusions
This paper describes in detail the emerging security paradigm known as Zero Trust Architecture. It examines a wide range of implementation strategies and gives an in-depth analysis of zero trust networks essential ideas, including its logical components. Recognizing that no single technology or architecture can fully realize ZT models, the article examines the numerous methodologies and approaches required for its successful implementation. The study emphasizes the necessity of authentication and access control approaches in continuously re-evaluating trust within ongoing connections, emphasizing the value of context, behaviour, and perceived threats. These strategies contribute to the proper implementation of ZTA by taking into account the unique environment of each organization. Furthermore, this article emphasizes the importance of encryption, micro-segmentation, and software-defined perimeters as essential components in building a secure network. The most recent methodologies for applying the indicated security techniques in diverse circumstances are investigated, providing insights into their practical application. This paper also outlines an analysis aimed at examining user perspectives on the usability and security aspects within the context of a zero trust framework. This study serves as a significant resource for scholars, practitioners, and policymakers looking to grasp the essential ideas, approaches, and problems connected with this unique security paradigm by providing a complete review of zero trust models. It establishes the groundwork for future advances in zero trust networks implementation and promotes a more secure and robust approach to network architecture.
Acknowledgments
The authors would like to thank the United Arab Emirates University for supporting this work under UAEU Strategic Research Grant G00003676 (Fund No.: 12R136) through the Big Data Analytics Center and UAEU-ZU Joint Research Grants G00003819 and G00003715 through the Emirates Center for Mobility Research, and Deanship of Scientific Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Saudi Arabia, under the Project GRANT5,104.
Author Contributions
Conceptualization, P.D., N.S., Y.G., S.T., A.K., K.U.N. and Y.H.; methodology, P.D., N.S., Y.G., S.T., A.K., K.U.N. and Y.H.; software, P.D., N.S., Y.G. and S.T.; validation, P.D., N.S., Y.G., A.K. and Y.H.; formal analysis, P.D., N.S. and A.K.; investigation, P.D., N.S., Y.G., S.T., A.K., K.U.N. and Y.H.; resources, Y.G. and S.T.; data curation, P.D., N.S. and A.K.; writing—original draft P.D. and N.S.; preparation P.D., N.S., Y.G., S.T., A.K., K.U.N. and Y.H.; writing—review and editing, P.D., N.S., Y.G., S.T., A.K., K.U.N. and Y.H.; visualization, Y.G., S.T. and Y.H.; supervision, Y.G. and A.K.; project administration, Y.G. and S.T.; funding acquisition, Y.G. and S.T. All authors have read and agreed to the published version of the manuscript.
Data Availability Statement
The data presented in this study are available within this article.
Conflicts of Interest
The authors declare no conflicts of interest.
Funding Statement
This research was funded by the United Arab Emirates University, UAEU Strategic Research Grant G00003676 through the Big Data Analytics Center.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.DeCusatis C., Liengtiraphan P., Sager A., Pinelli M. Implementing zero trust cloud networks with transport access control and first packet authentication; Proceedings of the 2016 IEEE International Conference on Smart Cloud (SmartCloud); New York, NY, USA. 18–20 November 2016; pp. 5–10. [Google Scholar]
- 2.Teerakanok S., Uehara T., Inomata A. Migrating to zero trust architecture: Reviews and challenges. Secur. Commun. Netw. 2021;2021:9947347. doi: 10.1155/2021/9947347. [DOI] [Google Scholar]
- 3.Hosney E.S., Halim I.T.A., Yousef A.H. An artificial intelligence approach for deploying zero trust architecture (zta); Proceedings of the 2022 5th International Conference on Computing and Informatics (ICCI); New Cairo, Cairo, Egypt. 9–10 March 2022; pp. 343–350. [Google Scholar]
- 4.Rose S., Borchert O., Mitchell S., Connelly S. Zero Trust Architecture NIST Special Publication 800-207 (Final) [(accessed on 15 April 2023)];2020 August; Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.
- 5.Sarkar S., Choudhary G., Shandilya S.K., Hussain A., Kim H. Security of zero trust networks in cloud computing: A comparative review. Sustainability. 2022;14:11213. doi: 10.3390/su141811213. [DOI] [Google Scholar]
- 6.Yeoh W., Liu M., Shore M., Jiang F. Zero trust cybersecurity: Critical success factors and A maturity assessment framework. Comput. Secur. 2023;133:103412. doi: 10.1016/j.cose.2023.103412. [DOI] [Google Scholar]
- 7.Alevizos L., Ta V.T., Hashem Eiza M. Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Secur. Priv. 2022;5:e191. doi: 10.1002/spy2.191. [DOI] [Google Scholar]
- 8.Meng L., Huang D., An J., Zhou X., Lin F. A continuous authentication protocol without trust authority for zero trust architecture. China Commun. 2022;19:198–213. doi: 10.23919/JCC.2022.08.015. [DOI] [Google Scholar]
- 9.Mir A.W., Ram Kumar K.R. Zero trust user access and identity security in smart grid based scada systems; Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020); Online. 15–18 December 2020; Berlin/Heidelberg, Germany: Springer International Publishing; 2020. pp. 716–726. [Google Scholar]
- 10.Adahman Z., Malik A.W., Anwar Z. An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Comput. Secur. 2022;122:102911. doi: 10.1016/j.cose.2022.102911. [DOI] [Google Scholar]
- 11.Gupta A., Gupta R., Jadav D., Tanwar S., Kumar N., Shabaz M. Proxy smart contracts for zero trust architecture implementation in Decentralised Oracle Networks based applications. Comput. Commun. 2023;206:10–21. doi: 10.1016/j.comcom.2023.04.022. [DOI] [Google Scholar]
- 12.Dhiman P. Empirical validation of website quality using statistical and machine learning methods; Proceedings of the 2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence); Noida, India. 25–26 September 2014; pp. 286–291. [Google Scholar]
- 13.Onome E.D.O.C., Tenebe T., Etu E.E., Ayuwu A., Emakhu J., Adebiyi S. Zero Trust Architecture: Trend and Impact on Information Security. Int. J. Emerg. Technol. Adv. Eng. 2022;12:140–147. doi: 10.46338/ijetae0722_15. [DOI] [Google Scholar]
- 14.He Y., Huang D., Chen L., Ni Y., Ma X. A survey on zero trust architecture: Challenges and future trends. Wirel. Commun. Mob. Comput. 2022;2022:6476274. doi: 10.1155/2022/6476274. [DOI] [Google Scholar]
- 15.Sultana M., Hossain A., Laila F., Taher K.A., Islam M.N. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med. Inform. Decis. Mak. 2020;20:256. doi: 10.1186/s12911-020-01275-y. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 16.Tian X.P., Song H.H. A zero trust method based on BLP and BIBA model; Proceedings of the 2021 14th International Symposium on Computational Intelligence and Design (ISCID); Hangzhou, China. 11–12 December 2021; pp. 96–100. [Google Scholar]
- 17.Ferraiolo D., Chandramouli R., Hu V., Kuhn R. A comparison of attribute based access control (ABAC) standards for data service applications. NIST Spec. Publ. 2016;800:178. [Google Scholar]
- 18.Assunção P. A Zero Trust Approach to Network Security; Proceedings of the Digital Privacy and Security Conference 2019; Miami, FL, USA. 15–17 May 2019. [Google Scholar]
- 19.Lukaseder T., Halter M., Kargl F. Sicherheit 2020. Gesellschaft für Informatik e.V.; Bonn, Germany: 2020. Context-based Access Control and Trust Scores in Zero Trust Campus Networks. [Google Scholar]
- 20.Liu H., Ai M., Huang R., Qiu R., Li Y. Identity authentication for edge devices based on zero-trust architecture. Concurr. Comput. Pract. Exp. 2022;34:e7198. doi: 10.1002/cpe.7198. [DOI] [Google Scholar]
- 21.Sheikh N., Pawar M., Lawrence V. Zero trust using network micro segmentation; Proceedings of the IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); Vancouver, BC, Canada. 10–13 May 2021; pp. 1–6. [Google Scholar]
- 22.Syed N.F., Shah S.W., Shaghaghi A., Anwar A., Baig Z., Doss R. Zero trust architecture (zta): A comprehensive survey. IEEE Access. 2022;10:57143–57179. doi: 10.1109/ACCESS.2022.3174679. [DOI] [Google Scholar]
- 23.Kumar N., Kasbekar G.S., Manjunath D. Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm. ACM SIGMETRICS Perform. Eval. Rev. 2023;50:5–7. doi: 10.1145/3595244.3595247. [DOI] [Google Scholar]
- 24.Dadheech K., Choudhary A., Bhatia G. De-militarized zone: A next level to network security; Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT); Coimbatore, India. 20–21 April 2018; pp. 595–600. [Google Scholar]
- 25.Pandey B.K., Veeramanickam M.R.M., Ahmad S., Rodriguez C., Esenarro D. ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. Comput. Secur. 2023;124:102975. doi: 10.1016/j.cose.2022.102975. [DOI] [Google Scholar]
- 26.Huang Q., Yang C., Liu K., Xia J., Xu C., Li J., Gui Z., Sun M., Li Z. Evaluating open-source cloud computing solutions for geosciences. Comput. Geosci. 2013;59:41–52. doi: 10.1016/j.cageo.2013.05.001. [DOI] [Google Scholar]
- 27.Kyryk M., Pleskanka N., Pleskanka M., Kyryk V. Future Intent-Based Networking. Springer; Berlin/Heidelberg, Germany: 2022. Infrastructure as Code and Microservices for Intent-Based Cloud Networking; pp. 51–68. [Google Scholar]
- 28.Eidle D., Ni S.Y., DeCusatis C., Sager A. Autonomic security for zero trust networks; Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON); New York, NY, USA. 19–21 October 2017; pp. 288–293. [Google Scholar]
- 29.DeCusatis C., Liengtiraphan P., Sager A. Online Engineering & Internet of Things. Springer; Berlin/Heidelberg, Germany: 2018. Advanced intrusion prevention for geographically dispersed higher education cloud networks; pp. 132–143. [Google Scholar]
- 30.Jasim A.C., Hassoon I.A., Tapus N. Cloud: Privacy for Locations Based-services’ through Access Control with dynamic multi-level policy; Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT); Paris, France. 23–26 April 2019; pp. 1911–1916. [Google Scholar]
- 31.Albuali A., Mengistu T., Che D. ZTIMM: A zero-trust-based identity management model for volunteer cloud computing; Proceedings of the International Conference on Cloud Computing; Honolulu, HI, USA. 18–20 September 2020; Cham, Switzerland: Springer; 2020. pp. 287–294. [Google Scholar]
- 32.Rodigari S., O’Shea D., McCarthy P., McCarry M., McSweeney S. Performance Analysis of Zero-Trust multi-cloud; Proceedings of the 2021 IEEE 14th International Conference on Cloud Computing (CLOUD); Chicago, IL, USA. 5–10 September 2021; pp. 730–732. [Google Scholar]
- 33.De Weever C., Andreou M. Zero Trust Network Security Model in Containerized Environments. University of Amsterdam; Amsterdam, The Netherlands: 2020. [Google Scholar]
- 34.Moubayed A., Refaey A., Shami A. Software-defined perimeter (sdp): State of the art secure solution for modern networks. IEEE Netw. 2019;33:226–233. doi: 10.1109/MNET.2019.1800324. [DOI] [Google Scholar]
- 35.Vanickis R., Jacob P., Dehghanzadeh S., Lee B. Access control policy enforcement for zero-trust-networking; Proceedings of the 2018 29th Irish Signals and Systems Conference (ISSC); Belfast, UK. 21–22 June 2018; pp. 1–6. [Google Scholar]
- 36.Ahmed M., Petrova K. A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments. [(accessed on 30 July 2022)]. Available online: https://aisel.aisnet.org/wisp2020/4/
- 37.Mehraj S., Banday M.T. Establishing a zero trust strategy in cloud computing environment; Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI); Coimbatore, India. 22–24 January 2020; pp. 1–6. [Google Scholar]
- 38.Ramezanpour K., Jagannath J. Intelligent zero trust architecture for 5G/6G tactical networks: Principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 2022;217:109358. doi: 10.1016/j.comnet.2022.109358. [DOI] [Google Scholar]
- 39.Awan S.M., Azad M.A., Arshad J., Waheed U., Sharif T. A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT. Information. 2023;14:129. doi: 10.3390/info14020129. [DOI] [Google Scholar]
- 40.Liu H., Han D., Li D. Fabric-IoT: A blockchain-based access control system in IoT. IEEE Access. 2020;8:18207–18218. doi: 10.1109/ACCESS.2020.2968492. [DOI] [Google Scholar]
- 41.Bezawada B., Haefner K., Ray I. Securing home IoT environments with attribute-based access control; Proceedings of the Third ACM Workshop on Attribute-Based Access Control; Tempe, AZ, USA. 21 March 2018; pp. 43–53. [Google Scholar]
- 42.Chen B., Qiao S., Zhao J., Liu D., Shi X., Lyu M., Chen H., Lu H., Zhai Y. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture. IEEE Internet Things J. 2021;8:10248–10263. doi: 10.1109/JIOT.2020.3041042. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 43.Kumar A., Sharma S., Goyal N., Singh A., Cheng X., Singh P. Secure and energy-efficient smart building architecture with emerging technology IoT. Comput. Commun. 2021;176:207–217. doi: 10.1016/j.comcom.2021.06.003. [DOI] [Google Scholar]
- 44.Wang Z.H., Jin M.H., Jiang L., Feng C.J., Cao J.Y., Yun Z. International Conference on Swarm Intelligence. Springer; Cham, Switzerland: 2023. Secure Access Method of Power Internet of Things Based on Zero Trust Architecture; pp. 386–399. [Google Scholar]
- 45.Saleem M., Warsi M.R., Islam S. Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. J. Inf. Secur. Appl. 2023;72:103389. doi: 10.1016/j.jisa.2022.103389. [DOI] [Google Scholar]
- 46.Wan S., Lin H., Gan W., Chen J., Yu P.S. Web3: The Next Internet Revolution. arXiv. 20232304.06111 [Google Scholar]
- 47.Cheng R., Chen S., Han B. Towards Zero-trust Security for the Metaverse. IEEE Commun. Mag. 2023 doi: 10.1109/MCOM.018.2300095. [DOI] [Google Scholar]
- 48.Dhiman P., Kaur A., Hamid Y., Alabdulkreem E., Elmannai H., Ababneh N. Smart Disease Detection System for Citrus Fruits Using Deep Learning with Edge Computing. Sustainability. 2023;15:4576. doi: 10.3390/su15054576. [DOI] [Google Scholar]
- 49.Dimitrakos T., Dilshener T., Kravtsov A., La Marra A., Martinelli F., Rizos A., Rosetti A., Saracino A. Trust aware continuous authorization for zero trust in consumer internet of things; Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Guangzhou, China. 29 December 2020–1 January 2021; pp. 1801–1812. [Google Scholar]
- 50.Xiaojian Z., Liandong C., Jie F., Xiangqun W., Qi W. Power IoT security protection architecture based on zero trust framework; Proceedings of the 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP); Zhuhai, China. 8–10 January 2021; pp. 166–170. [Google Scholar]
- 51.Ameer S., Gupta M., Bhatt S., Sandhu R. Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems; Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies; New York, NY, USA. 8–10 June 2022; pp. 235–244. [Google Scholar]
- 52.Federici F., Martintoni D., Senni V. A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures. Electronics. 2023;12:566. doi: 10.3390/electronics12030566. [DOI] [Google Scholar]
- 53.Yan X., Wang H. Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, 17–20 July 2020. Springer; Singapore: 2020. Survey on zero-trust network security; pp. 50–60. Proceedings, Part I 6. [Google Scholar]
- 54.Ferretti L., Magnanini F., Andreolini M., Colajanni M. Survivable zero trust for cloud computing environments. Comput. Secur. 2021;110:102419. doi: 10.1016/j.cose.2021.102419. [DOI] [Google Scholar]
- 55.Dhar S., Bose I. Securing IoT devices using zero trust and blockchain. J. Organ. Comput. Electron. Commer. 2021;31:18–34. doi: 10.1080/10919392.2020.1831870. [DOI] [Google Scholar]
- 56.Liu Y., Hao X., Ren W., Xiong R., Zhu T., Choo K.K.R., Min G. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 2022;72:501–512. doi: 10.1109/TC.2022.3157996. [DOI] [Google Scholar]
- 57.Wang J., Chen J., Xiong N., Alfarraj O., Tolba A., Ren Y. S-BDS: An effective blockchain-based data storage scheme in zero-trust IoT. ACM Trans. Internet Technol. 2022;23:1–23. doi: 10.1145/3511902. [DOI] [Google Scholar]
- 58.Feng Y., Zhong Z., Sun X., Wang L., Lu Y., Zhu Y. Blockchain enabled zero trust based authentication scheme for railway communication networks. J. Cloud Comput. 2023;12:62. doi: 10.1186/s13677-023-00411-z. [DOI] [Google Scholar]
- 59.Li P., Ou W., Liang H., Han W., Zhang Q., Zeng G. A zero trust and blockchain-based defense model for smart electric vehicle chargers. J. Netw. Comput. Appl. 2023;213:103599. doi: 10.1016/j.jnca.2023.103599. [DOI] [Google Scholar]
- 60.Lei W., Pang Z., Wen H., Hou W., Zhang X. Edge-enabled Zero Trust Architecture for ICPS with Spatial and Temporal Granularity; Proceedings of the 2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS); Wuhan, China. 8–11 May 2023; pp. 1–6. [Google Scholar]
- 61.Sethi P.S., Jain A. Future Connected Technologies: Growing Convergence and Security Implications. CRC Press; Boca Raton, FL, USA: 2023. Edge Computing; p. 162. [Google Scholar]
- 62.Ali B., Gregory M.A., Li S. Uplifting healthcare cyber resilience with a multi-access edge computing zero-trust security model; Proceedings of the 2021 31st International Telecommunication Networks and Applications Conference (Itnac); Sydney, Australia. 24–26 November 2021; pp. 192–197. [Google Scholar]
- 63.Kholidy H.A., Karam A., Sidoran J., Rahman M.A., Mahmoud M., Badr M., Mahmud M., Sayed A.F. Toward Zero Trust Security IN 5G Open Architecture Network Slices; Proceedings of the MILCOM 2022–2022 IEEE Military Communications Conference (MILCOM); Rockville, MD, USA. 28 November–2 December 2022; pp. 577–582. [Google Scholar]
- 64.Chen L., Dai Z., Chen M., Li N. Research on the security protection framework of power mobile internet services based on zero trust; Proceedings of the 2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA); Kunming, China. 29–30 May 2021; pp. 65–68. [Google Scholar]
- 65.Kindervag J. Build Security into Your Network’s DNA: The Zero Trust Network Architecture. Volume 27 Forrester Research Inc.; Cambridge, MA, USA: 2010. [Google Scholar]
- 66.Li S., Iqbal M., Saxena N. Future industry internet of things with zero-trust security. Inf. Syst. Front. 2022:1–14. doi: 10.1007/s10796-021-10199-5. [DOI] [Google Scholar]
- 67.Bambacht J., Pouwelse J. Web3: A decentralized societal infrastructure for identity, trust, money, and data. arXiv. 20222203.00398 [Google Scholar]
- 68.Bai P., Bisht C. Decentralized Identity Management: Prerequisiteof Web3 Identity Model. 2023. [(accessed on 23 July 2023)]. Available online: https://www.techrxiv.org/doi/full/10.36227/techrxiv.20424633.v1.
- 69.Qiu Y., Zhang H., Sun K., Long K., Nallanathan A. Fog-assisted Blockchain Radio Access Network for Web3. IEEE Commun. Mag. 2023;61:76–82. doi: 10.1109/MCOM.006.2200487. [DOI] [Google Scholar]
- 70.Ishide K., Okada S., Fujimoto M., Mitsunaga T. ML Detection Method for Malicious Operation in Hybrid Zero Trust Architecture; Proceedings of the 2022 IEEE International Conference on Computing (ICOCO); Kota Kinabalu, Malaysia. 14–16 November 2022; pp. 264–269. [Google Scholar]
- 71.Hireche O., Benzaïd C., Taleb T. Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput. Netw. 2022;203:108668. doi: 10.1016/j.comnet.2021.108668. [DOI] [Google Scholar]
- 72.Bai W., Namara M., Qian Y., Kelley P.G., Mazurek M.L., Kim D. An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for {Key-Directory} Encryption Systems; Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016); Denver, CO, USA. 22–24 June 2016; pp. 113–130. [Google Scholar]
- 73.Dhillon G., Oliveira T., Susarapu S., Caldeira M. Deciding between information security and usability: Developing value based objectives. Comput. Hum. Behav. 2016;61:656–666. doi: 10.1016/j.chb.2016.03.068. [DOI] [Google Scholar]
- 74.Gunson N., Marshall D., Morton H., Jack M. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 2011;30:208–220. doi: 10.1016/j.cose.2010.12.001. [DOI] [Google Scholar]
- 75.AlQadheeb A., Bhattacharyya S., Perl S. Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior. Array. 2022;14:100146. doi: 10.1016/j.array.2022.100146. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The data presented in this study are available within this article.