2022
DOI: 10.3390/su141811213
|View full text |Cite
|
Sign up to set email alerts
|

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

Abstract: Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability and oversight of its overall security. Several emerging technologies have restructured our approach to the security of cloud networks; one such approach is the zero-trust network architecture (ZTNA), where no entity is implicitly trusted in the network, regardless … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(17 citation statements)
references
References 57 publications
0
17
0
Order By: Relevance
“…Despite significant advances in security enforcement, attackers are still able to compromise organisations’ computing resources [ 55 ], explained by the increasing management complexity handled by security teams [ 56 ]. In our approach, the FSMs open the opportunity to formalise and personalise the policy decisions related to user behaviour, organisational systems, and data in all access contexts.…”
Section: Data Modellingmentioning
confidence: 99%
“…Despite significant advances in security enforcement, attackers are still able to compromise organisations’ computing resources [ 55 ], explained by the increasing management complexity handled by security teams [ 56 ]. In our approach, the FSMs open the opportunity to formalise and personalise the policy decisions related to user behaviour, organisational systems, and data in all access contexts.…”
Section: Data Modellingmentioning
confidence: 99%
“…Security of customer data is a prerequisite, as well as being a daily function. Hence, cloud services use security systems [80], [81], [82], [83] that utilize a distributed architecture that can absorb, filter, and deflect malicious requests that pose a threat to the system [61], [71].…”
Section: Benefits Of Cloud Computingmentioning
confidence: 99%
“…Manpower is freed to engage in other tasks, creating economic value. However, their reliance on the cloud providers for data security and lack of control over their data in the cloud creates a security and data privacy problem as they do not know where the data is stored or even how it is handled at the storage location [61], [85].…”
Section: Benefits Of Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations