Zero Trust Evolution: Advanced Architectures for Resilient Cloud-Native IAM Systems

Authors

  • Arun Ganapathi Oracle, USA Author

DOI:

https://doi.org/10.32628/CSEIT25111261

Keywords:

Zero Trust Architecture (ZTA), Identity and Access Management (IAM), Decentralized Identity Systems, Adaptive Authentication, System Reliability

Abstract

This article explores the evolution of Zero Trust Architecture (ZTA) and its integration with cloud-native Identity and Access Management (IAM) systems. It presents a comprehensive article analysis of advanced security frameworks in modern distributed environments. The article examines the transformation from traditional perimeter-based security models to sophisticated identity-centric approaches, highlighting the critical role of continuous verification mechanisms and adaptive authentication systems. The article demonstrates how organizations can enhance their security posture while maintaining user privacy and regulatory compliance through surveys of decentralized identity integration, blockchain-based credentials, and self-sovereign identity concepts. The article also delves into system reliability and high availability considerations, exploring fault tolerance strategies, redundancy patterns, and recovery mechanisms essential for maintaining robust security implementations. By analyzing emerging technologies, implementation best practices, and standardization efforts, this research provides valuable insights into the future direction of security architectures. It offers recommendations for organizations navigating the complex landscape of modern cybersecurity challenges.

Downloads

Download data is not yet available.

References

Po-Han Ho, Hong-Yen Chen, "Zero Trust Architecture of Token Network," https://ieeexplore.ieee.org/document/10271881

Joel Proulx, "The Role of Identity and Access Management in Zero Trust Security," https://www.premcom.com/post/the-role-of-identity-and-access-management-in-zero-trust-security

Naeem Firdous Syed et al., "Zero Trust Architecture (ZTA): A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 1123-1142, 2023. https://ieeexplore.ieee.org/document/9773102

Min Yang et al., "Trust Evaluation Model with Stakeholder-Centric in Grids," in IEEE International Conference on Grid Computing, pp. 345-352, 2010. https://ieeexplore.ieee.org/document/5523160

Laura Pryor, Rushit Dave, "Machine Learning Algorithms in User Authentication Schemes," IEEE Transactions on Information Forensics and Security, vol. 16, no. 4, pp. 891-904, 2021. https://ieeexplore.ieee.org/document/9698440

Abhinav Gupta et al., "Prognosis Negative: Evaluating Real-Time Behavioral Analysis for Security," in IEEE European Symposium on Security and Privacy Workshops, pp. 234-243, 2021. https://ieeexplore.ieee.org/abstract/document/9581177

Axel Küpper et al., "Decentralized Identifiers and Self-Sovereign Identity - A New Identity Management for 6G Integration?: MobileCloud 2021 Invited Talk" in 2021 IEEE International Conference on Joint Cloud Computing (JCC), pp. 178-189. https://ieeexplore.ieee.org/document/9566202

Hrithik Gaikwad, "A Blockchain-Based Verification System for Academic Certificates," in 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), pp. 234-245. https://ieeexplore.ieee.org/document/9526377

Emanuel Bernardi et al., "Fault-Tolerant Model Predictive Control Strategy Applied to Industrial Processes," in 2019 XVIII Workshop on Information Processing and Control (RPIC), pp. 567-576. https://ieeexplore.ieee.org/document/8882143

Robert S. Hanmer, "Architecting for Reliability - Recovery Mechanisms," in 2008 19th International Symposium on Software Reliability Engineering (ISSRE), pp. 123-134. https://ieeexplore.ieee.org/document/4700339

Joan L. Aron et al., "Best Practices for Security Implementation in Enterprise Environments," IEEE Transactions on Big Data, vol. 10, no. 2, pp. 567-578, 2014. https://ieeexplore.ieee.org/abstract/document/7004469

Downloads

Published

13-01-2025

Issue

Section

Research Articles