Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in April 2026 (Volume 30, Issue 1) Submit manuscript

Implementing zero trust security models in cloud computing environments

Breadcrumb

  • Home
  • Implementing zero trust security models in cloud computing environments

Godwin Nzeako 1, * and Rahman Akorede Shittu 2

1 Independent Researcher, Finland.
2 University of North Carolina, Greensboro, USA.
 
Review Article
World Journal of Advanced Research and Reviews, 2024, 24(03), 1647-1660
Article DOI: 10.30574/wjarr.2024.24.3.3500
DOI url: https://doi.org/10.30574/wjarr.2024.24.3.3500
 
Received on 08 November 2024; revised on 16 December 2024; accepted on 18 December 2024
 
In today’s rapidly evolving digital landscape, the adoption of cloud computing has fundamentally reshaped how organizations manage, store, and secure data. While cloud infrastructures offer scalability, flexibility, and resource efficiency, they also introduce complex security challenges. Traditional perimeter-based security models fall short in the face of these new threats, necessitating a paradigm shift towards the Zero Trust Security (ZTS) model. This model enforces strict access controls, continuous monitoring, and assumes no inherent trust within or outside the network. This paper offers an extensive exploration of Zero Trust in cloud computing environments, delving into its principles, architecture, implementation strategies, challenges, and anticipated future developments. Through a mix of theoretical discussion, technical frameworks, and real-world case studies, the study aims to provide a robust roadmap for organizations aspiring to adopt Zero Trust models in cloud infrastructures, achieving a balance between security and operational efficiency.
 
Zero Trust Security; Cloud Computing; Access Control; Cybersecurity; Network Segmentation; Data Privacy; Identity Management
 
https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2024-3500.pdf

Preview Article PDF

Godwin Nzeako and Rahman Akorede Shittu. Implementing zero trust security models in cloud computing environments. World Journal of Advanced Research and Reviews, 2024, 24(3), 1647-1660. Article DOI: https://doi.org/10.30574/wjarr.2024.24.3.3500

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution