Published: 2025-12-01
Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud
DOI: 10.35870/ijsecs.v5i3.5481
T. Irfan Fajri, Handry Eldo, Cut Susan Octiva, Dikky Suryadi, Muhammad Lukman Hakim
Downloads
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Data security concerns have increasingly become a challenge to cloud computing services due to rising incidents of cyberattacks, identity theft, and data manipulation. The perimeter-based security model is ineffective because of vulnerabilities in authentication and access control, thus necessitating an adaptive layered approach. This paper presents attempts to merge Zero Trust Architecture (ZTA) with Blockchain technology as one possible way to ensure confidentiality, integrity, and availability of data in cloud environments. Research methodology comprises a detailed review of related literature, system architecture analysis, and simulation of the conceptual merger using encryption protocols and smart contracts. Results revealed that ZTA significantly reduces the opportunities for unauthorized access through multi-layered verification and least privilege principles while Blockchain provides a decentralized transparent immutable method for recording transactions on data. The hybrid will enhance security substantially against breaches from external attackers and insiders with an already established verifiable audit trail. This paper concludes that such a merger could create a stronger model—one that is more measurable—and sustainable for securing today's cloud infrastructure.
Keywords
Zero Trust Architecture ; Blockchain ; Cloud Security ; Insider Threats ; Data Integrity
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 5 No. 3 (2025)
-
Section: Articles
-
Published: %750 %e, %2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/ijsecs.v5i3.5481
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Cut Susan Octiva
Institut Sains dan Teknologi Nasional, South Jakarta City, Special Capital Region of Jakarta, Indonesia
Dikky Suryadi
Institut Sains Teknologi Nasional, South Jakarta City, Special Capital Region of Jakarta, Indonesia
-
Alevizos, L., Ta, V. T., & Eiza, M. H. (2022). Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture. IEEE Access, 10, 89270–89288. https://doi.org/10.1109/ACCESS.2022.3200165Singh, B., & Kaunert, C. (2025). Zero-trust evolution and cloud computing security as multi-mission engineering: Addressing emerging threats, regulations, and modeling solutions via enhancing blockchain consensus algorithm to mitigate data repository breaches. In Zero-Trust Learning (pp. 357–385). https://doi.org/10.1201/9781779643575-17Ahmadi, S. (2024). Zero trust architecture in cloud networks: Application, challenges and future opportunities. Journal of Engineering Research and Reports, 26(2), 215–228. https://doi.org/10.9734/JERR/2024/V26I21083Pooja, S., & Chandrakala, C. B. (2024). Secure reviewing and data sharing in scientific collaboration: Leveraging blockchain and zero trust architecture. IEEE Access, 12, 92386–92399. https://doi.org/10.1109/ACCESS.2024.3423338Zhang, W., & Chen, L. (2025). Developing a zero-trust security model for cloud migration: Ensuring data integrity and confidentiality in hybrid cloud architectures. Advances in Theoretical Computation, Algorithmic Foundations, and Emerging Paradigms, 15(2), 15–27. https://heilarchive.com/index.php/ATCAEP/article/view/2025-Feb-07Chen, Z., Yan, L., Lü, Z., Zhang, Y., Guo, Y., Liu, W., & Xuan, J. (2021). Research on zero-trust security protection technology of power IoT based on blockchain. Journal of Physics: Conference Series, 1769(1), 012039. https://doi.org/10.1088/1742-6596/1769/1/012039Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Integration of blockchain and cloud of things: Architecture, applications and challenges. IEEE Communications Surveys and Tutorials, 22(4), 2521–2549. https://doi.org/10.1109/COMST.2020.3020092Alevizos, L., Eiza, M. H., Ta, V. T., Shi, Q., & Read, J. (2022). Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Security and Privacy, 5(1), e191. https://doi.org/10.1002/SPY2.191Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18–34. https://doi.org/10.1080/10919392.2020.1831870Potluri, S. (2024). A zero trust-based identity and access management framework for cross-cloud federated networks. International Journal of Emerging Research in Engineering and Technology, 5(2), 28–40. https://doi.org/10.63282/3050-922X.IJERET-V5I2P104Awadallah, R., Samsudin, A., Teh, J. S., & Almazrooie, M. (2021). An integrated architecture for maintaining security in cloud computing based on blockchain. IEEE Access, 9, 69513–69526. https://doi.org/10.1109/ACCESS.2021.3077123Salim, M. M., Kim, M., Singh, S. K., & Park, J. H. (2026). Zero-trust blockchain-enabled framework for scalable and secure IoT networks. Future Generation Computer Systems, 175, 108093. https://doi.org/10.1016/J.FUTURE.2025.108093Sultana, M., Hossain, A., Laila, F., Taher, K. A., & Islam, M. N. (2020). Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics and Decision Making, 20(1), 1–10. https://doi.org/10.1186/S12911-020-01275-YUzoma, E., Enyejo, J. O., & Motilola Olola, T. (2025). A comprehensive review of multi-cloud distributed ledger integration for enhancing data integrity and transactional security. International Journal of Innovative Science and Research Technology, 1953–1970. https://doi.org/10.38124/IJISRT/25MAR1970Chaudhry, U. B., & Hydros, A. K. M. (2023). Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm. IET Blockchain, 3(2), 98–115. https://doi.org/10.1049/BLC2.12028

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.