Zero Trust Security Paradigm: A Comprehensive Survey and Research Analysis

Main Article Content

Shaikh Ashfaq, Sonali A Patil, Santosh Borde, Pankaj Chandre, Pathan Mohd Shafi, Anjali Jadhav

Abstract

This paper investigates the Zero Trust Security Paradigm, a cutting-edge strategy for cybersecurity that defies established paradigms. We look at the operation of this method and its real-world applications, covering everything from the fundamental ideas to their application. We identify the benefits, drawbacks, and potential applications of Zero Trust Security through a thorough analysis of case studies and current research. The purpose of this research is to add to the continuing discussion regarding the best ways to safeguard digital systems in our globally interconnected environment, thereby assisting researchers and cybersecurity professionals. The Zero Trust Security Paradigm calls for a major departure from the conventional trust-based network models in response to the growing threat of cyberattacks. This research looks at how companies might apply and adjust to this paradigm considering the changing threat environment. The goal of the work is to give cybersecurity experts useful insights to help them manage the challenges of securing contemporary digital infrastructures by addressing both theoretical underpinnings and practical factors.

Article Details

Section
Articles
Author Biography

Shaikh Ashfaq, Sonali A Patil, Santosh Borde, Pankaj Chandre, Pathan Mohd Shafi, Anjali Jadhav

1Shaikh Ashfaq

2Sonali A Patil

3Santosh Borde

4Pankaj Chandre

5Pathan Mohd Shafi

6Anjali Jadhav

1Assistant Professor, Information Technology Department, M H Saboo Siddik College of Engineering, Mumbai, India, ashfaq.shaikh@mhssce.ac.in

2Assistant Professor, Computer Science & Engineering Department, MIT School of Computing, MIT Art Design and Technology University, Loni Kalbhor, Pune, India, sonali.patil@mituniversity.edu.in

3JSPM’S Rajarshi Shahu College of Engineering, Pune, India, santoshborde@yahoo.com

4Associate Professor, Computer Science & Engineering Department, MIT School of Computing, MIT Art Design and Technology University, Loni Kalbhor, Pune, India, pankaj.chandre@mituniversity.edu.in

5Professor, Computer Science & Engineering Department, MIT School of Computing, MIT Art Design and Technology University, Loni Kalbhor, Pune, India, shafi.pathan@mituniversity.edu.in

6Data scientist, Vanquisher Software Services Pvt.Ltd, Pune, India, anjalij@vanquishertech.com

*Correspondence:  pankaj.chandre@mituniversity.edu.in

Copyright © JES 2023 on-line : journal.esrgroups.org

References

C. Buck, C. Olenberger, A. Schweizer, F. Völter, and T. Eymann, “Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust,” Comput. Secur., vol. 110, p. 102436, 2021, doi: 10.1016/j.cose.2021.102436.

T. E. Nyamasvisva, A. Abdalla, and M. Arabi, “a Comprehensive Swot Analysis for Zero Trust Network Security Model,” Int. J. Infrastruct. Res. Manag., vol. 10, no. 1, pp. 44–53, 2022, [Online]. Available: https://iukl.edu.my/rmc/publications/ijirm/.

Y. He, D. Huang, L. Chen, Y. Ni, and X. Ma, “A Survey on Zero Trust Architecture: Challenges and Future Trends,” Wirel. Commun. Mob. Comput., vol. 2022, 2022, doi: 10.1155/2022/6476274.

P. R. Chandre, P. N. Mahalle, and G. R. Shinde, “Machine learning based novel approach for intrusion detection and prevention system: a tool based verification,” in 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), Nov. 2018, pp. 135–140, doi: 10.1109/GCWCN.2018.8668618.

S. H. A. Kazmi, F. Qamar, R. Hassan, K. Nisar, and B. S. Chowdhry, “Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions,” Wirel. Pers. Commun., vol. 130, no. 4, pp. 2753–2800, 2023, doi: 10.1007/s11277-023-10402-7.

V. S. Kore, B. A. Tidke, and P. Chandre, “Survey of Image Retrieval Techniques and Algorithms for Image-rich Information Networks,” Int. J. Comput. Appl., vol. 112, no. 6, pp. 39–42, 2015, [Online]. Available: https://www.ijcaonline.org/archives/volume112/number6/19674-1244%0Ahttp://research.ijcaonline.org/volume112/number6/pxc3901244.pdf.

S. Makubhai, G. R. Pathak, and P. R. Chandre, “Prevention in Healthcare : An Explainable AI Approach,” no. April, pp. 92–100, 2023.

K. Ramezanpour and J. Jagannath, “Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN,” Comput. Networks, vol. 217, no. February, p. 109358, 2022, doi: 10.1016/j.comnet.2022.109358.

S. R. Oh, Y. D. Seo, E. Lee, and Y. G. Kim, “A comprehensive survey on security and privacy for electronic health data,” Int. J. Environ. Res. Public Health, vol. 18, no. 18, 2021, doi: 10.3390/ijerph18189668.

S. Pinto and N. Santos, “Demystifying arm trustzone: A comprehensive survey,” ACM Comput. Surv., vol. 51, no. 6, 2019, doi: 10.1145/3291047.

S. Li, M. Iqbal, and N. Saxena, “Future Industry Internet of Things with Zero-trust Security,” Inf. Syst. Front., 2022, doi: 10.1007/s10796-021-10199-5.

N. F. Syed, S. W. Shah, A. Shaghaghi, A. Anwar, Z. Baig, and R. Doss, “Zero Trust Architecture (ZTA): A Comprehensive Survey,” IEEE Access, vol. 10, pp. 57143–57179, 2022, doi: 10.1109/ACCESS.2022.3174679.

Cody Shepherd and Boise State University, “Zero Trust Architecture: Framework and Case Study,” 2020.

S. Sarkar, G. Choudhary, S. K. Shandilya, A. Hussain, and H. Kim, “Security of Zero Trust Networks in Cloud Computing: A Comparative Review,” Sustain., vol. 14, no. 18, pp. 1–21, 2022, doi: 10.3390/su141811213.

U. Mattsson, “Zero Trust Architecture,” Control. Priv. Use Data Assets, pp. 127–134, 2022, doi: 10.1201/9781003189664-11.

M. Vorokhob, R. Kyrychok, V. Yaskevych, Y. Dobryshyn, and S. Sydorenko, “Modern Perspectives of Applying the Concept of Zero Trust in Building a Corporate Information Security Policy,” Cybersecurity Educ. Sci. Tech., vol. 1, no. 21, pp. 223–233, 2023, doi: 10.28925/2663-4023.2023.21.223233.

Deshpande S, Gujarathi J, Chandre P, Nerkar P. A comparative analysis of machine deep learning algorithms for intrusion detection in wsn. In: Security Issues and Privacy Threats in Smart Ubiquitous Computing, 2021; pp. 173–193. Springer.

El Mfadel, Ali & Melliani, Said & Elomari, Mhamed. (2022). Existence results for nonlocal Cauchy problem of nonlinear ψ−Caputo type fractional differential equations via topological degree methods. Advances in the Theory of Nonlinear Analysis and its Application. 6. 270 - 279. 10.31197/atnaa.1059793.

Matsuzawa, T., & Lshii, A. (2022). Evaluation of PSO Algorithm Considering Obstacle Avoidance in Evacuation Guidance. Advances in the Theory of Nonlinear Analysis and Its Applications, 6(3), 318–335.

Sable, N. P., Shende, P., Wankhede, V. A., Wagh, K. S., Ramesh, J. V. N., & Chaudhary, S. (2023). DQSCTC: design of an efficient deep dyna-Q network for spinal cord tumour classification to identify cervical diseases. Soft Computing, 1-26.

Khetani, V., Gandhi, Y., Bhattacharya, S., Ajani, S. N., & Limkar, S. (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253-262.

Ziane, D., Belgacem, R., & Bokhari, A. (2022). Local Fractional Aboodh Transform and its Applications to Solve Linear Local Fractional Differential Equations. Advances in the Theory of Nonlinear Analysis and Its Applications, 6(2), 217–228.