Abstract
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability and oversight of its overall security. Several emerging technologies have restructured our approach to the security of cloud networks; one such approach is the zero-trust network architecture (ZTNA), where no entity is implicitly trusted in the network, regardless of its origin or scope of access. The network rewards trusted behaviour and proactively predicts threats based on its users’ behaviour. The zero-trust network architecture is still at a nascent stage, and there are many frameworks and models to follow. The primary focus of this survey is to compare the novel requirement-specific features used by state-of-the-art research models for zero-trust cloud networks. In this manner, the features are categorized across nine parameters into three main types: zero-trust-based cloud network models, frameworks and proofs-of-concept. ZTNA, when wholly realized, enables network administrators to tackle critical issues such as how to inhibit internal and external cyber threats, enhance the visibility of the network, automate the calculation of trust for network entities and orchestrate security for users. The paper further focuses on domain-specific issues plaguing modern cloud computing networks, which leverage choosing and implementing features necessary for future networks and incorporate intelligent security orchestration, automation and response. The paper also discusses challenges associated with cloud platforms and requirements for migrating to zero-trust architecture. Finally, possible future research directions are discussed, wherein new technologies can be incorporated into the ZTA to build robust trust-based enterprise networks deployed in the cloud.
Funder
Institute of Information & communications Technology Planning & Evaluation, South Korea
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference76 articles.
1. Share of Corporate Data Stored in the Cloud in Organizations Worldwide from 2015 to 2022https://www.statista.com/statistics/1062879/worldwide-cloud-storage-of-corporate-data/
2. An Enhanced Intrusion Detection System Based on Multi-Layer Feature Reduction for Probe and DoS Attacks;El-Shrkawey;J. Internet Serv. Inf. Secur.,2021
3. An Investigation of Pseudonymization Techniques in Decentralized Transactions;Rahmadika;J. Internet Serv. Inf. Secur.,2021
4. Understanding Fuchsia Security;Pagano;J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.,2021
5. A survey on the security of pervasive online social networks (POSNs);Gupta;arXiv,2018
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献