Published: 2025-12-01

Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud

DOI: 10.35870/ijsecs.v5i3.5481

No Cover Available

Downloads

Article Metrics
Share:

Abstract

Data security concerns have increasingly become a challenge to cloud computing services due to rising incidents of cyberattacks, identity theft, and data manipulation. The perimeter-based security model is ineffective because of vulnerabilities in authentication and access control, thus necessitating an adaptive layered approach. This paper presents attempts to merge Zero Trust Architecture (ZTA) with Blockchain technology as one possible way to ensure confidentiality, integrity, and availability of data in cloud environments. Research methodology comprises a detailed review of related literature, system architecture analysis, and simulation of the conceptual merger using encryption protocols and smart contracts. Results revealed that ZTA significantly reduces the opportunities for unauthorized access through multi-layered verification and least privilege principles while Blockchain provides a decentralized transparent immutable method for recording transactions on data. The hybrid will enhance security substantially against breaches from external attackers and insiders with an already established verifiable audit trail. This paper concludes that such a merger could create a stronger model—one that is more measurable—and sustainable for securing today's cloud infrastructure.

Keywords

Zero Trust Architecture ; Blockchain ; Cloud Security ; Insider Threats ; Data Integrity

Peer Review Process

This article has undergone a double-blind peer review process to ensure quality and impartiality.

Indexing Information

Discover where this journal is indexed at our indexing page to understand its reach and credibility.

Open Science Badges

This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)