Zero Trust Evolution: Advanced Architectures for Resilient Cloud-Native IAM Systems
DOI:
https://doi.org/10.32628/CSEIT25111261Keywords:
Zero Trust Architecture (ZTA), Identity and Access Management (IAM), Decentralized Identity Systems, Adaptive Authentication, System ReliabilityAbstract
This article explores the evolution of Zero Trust Architecture (ZTA) and its integration with cloud-native Identity and Access Management (IAM) systems. It presents a comprehensive article analysis of advanced security frameworks in modern distributed environments. The article examines the transformation from traditional perimeter-based security models to sophisticated identity-centric approaches, highlighting the critical role of continuous verification mechanisms and adaptive authentication systems. The article demonstrates how organizations can enhance their security posture while maintaining user privacy and regulatory compliance through surveys of decentralized identity integration, blockchain-based credentials, and self-sovereign identity concepts. The article also delves into system reliability and high availability considerations, exploring fault tolerance strategies, redundancy patterns, and recovery mechanisms essential for maintaining robust security implementations. By analyzing emerging technologies, implementation best practices, and standardization efforts, this research provides valuable insights into the future direction of security architectures. It offers recommendations for organizations navigating the complex landscape of modern cybersecurity challenges.
Downloads
References
Po-Han Ho, Hong-Yen Chen, "Zero Trust Architecture of Token Network," https://ieeexplore.ieee.org/document/10271881
Joel Proulx, "The Role of Identity and Access Management in Zero Trust Security," https://www.premcom.com/post/the-role-of-identity-and-access-management-in-zero-trust-security
Naeem Firdous Syed et al., "Zero Trust Architecture (ZTA): A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 1123-1142, 2023. https://ieeexplore.ieee.org/document/9773102
Min Yang et al., "Trust Evaluation Model with Stakeholder-Centric in Grids," in IEEE International Conference on Grid Computing, pp. 345-352, 2010. https://ieeexplore.ieee.org/document/5523160
Laura Pryor, Rushit Dave, "Machine Learning Algorithms in User Authentication Schemes," IEEE Transactions on Information Forensics and Security, vol. 16, no. 4, pp. 891-904, 2021. https://ieeexplore.ieee.org/document/9698440
Abhinav Gupta et al., "Prognosis Negative: Evaluating Real-Time Behavioral Analysis for Security," in IEEE European Symposium on Security and Privacy Workshops, pp. 234-243, 2021. https://ieeexplore.ieee.org/abstract/document/9581177
Axel Küpper et al., "Decentralized Identifiers and Self-Sovereign Identity - A New Identity Management for 6G Integration?: MobileCloud 2021 Invited Talk" in 2021 IEEE International Conference on Joint Cloud Computing (JCC), pp. 178-189. https://ieeexplore.ieee.org/document/9566202
Hrithik Gaikwad, "A Blockchain-Based Verification System for Academic Certificates," in 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), pp. 234-245. https://ieeexplore.ieee.org/document/9526377
Emanuel Bernardi et al., "Fault-Tolerant Model Predictive Control Strategy Applied to Industrial Processes," in 2019 XVIII Workshop on Information Processing and Control (RPIC), pp. 567-576. https://ieeexplore.ieee.org/document/8882143
Robert S. Hanmer, "Architecting for Reliability - Recovery Mechanisms," in 2008 19th International Symposium on Software Reliability Engineering (ISSRE), pp. 123-134. https://ieeexplore.ieee.org/document/4700339
Joan L. Aron et al., "Best Practices for Security Implementation in Enterprise Environments," IEEE Transactions on Big Data, vol. 10, no. 2, pp. 567-578, 2014. https://ieeexplore.ieee.org/abstract/document/7004469
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.