JOURNAL ARTICLE

Zero Trust Security Framework for Multi-Cloud Environments

Opeyemi Rachel AlaoOlanike Esther AdekeyeBashiru Temitope AdeagboAbolaji Taoheed Oyerinde

Year: 2024 Journal:   International Journal of Scientific Research and Modern Technology. Pages: 162-162   Publisher: Modern Academy For Engineering & Technology

Abstract

Multi-cloud strategies are fast to adopt and have helped organizations to enhance flexibility, resilience, and compliance through workloads distribution between a number of cloud services providers. Nevertheless, the trend has also brought about a serious security problem in the form of heterogeneous identity management systems, unequal enforcement of policies and fragmented monitoring. The security models previously used relying on perimeter security are no more suited in these environments and this exposes enterprises to lateral movement, compromise of credentials and misconfigurations. The study has dealt with these issues by presenting a Zero Trust for Multi-Cloud (ZTMC) architecture that combines federated identity management, centralized policy decision-making, micro segmentation, continuous monitoring, and trust brokerage. A prototype implementation was tested in a testbed of controlled multi-cloud deployment in both AWS and Azure, and its performance was compared to baseline security models. The findings have indicated that the ZTMC model was effective in implementing the principles of Zero Trusts as it ensured uniform authentication and authorization, denied lateral mobility without authorization, and offered adaptive real-time monitoring. Even though a small overhead was found in terms of CPU usage, memory usage, and communication latency, it was compensated by the increased security posture and consistent policy. The results confirm that Zero Trust is adaptable to the multi-cloud environment and offer an avenue of greater and more consolidated control in the distributed setups. To make the research more widely applicable and more resilient over time, future studies must concentrate on large-scale verification, AI-based adaptive access controls, quantum-safe cryptography, and industry-wide standardization processes.

Keywords:
Computer security model Access control Security policy Authentication (law) Enforcement Testbed Overhead (engineering) Cloud computing Cloud computing security Compromise

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
2
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework

Santosh Pashikanti

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2023
JOURNAL ARTICLE

Implementing Zero Trust Architecture across Multi-Cloud Environments: A Security Framework

Santosh Pashikanti

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2023
JOURNAL ARTICLE

Zero Trust Security in Multi-Tenant Cloud Environments

Ramanan Hariharan

Journal:   Journal of Information Systems Engineering & Management Year: 2025 Vol: 10 (45s)Pages: 623-644
JOURNAL ARTICLE

Zero-trust Security Models for Multi-cloud Environments

Nikhil Tej Gandhi -

Journal:   International Journal For Multidisciplinary Research Year: 2024 Vol: 6 (6)
JOURNAL ARTICLE

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

Pavan MuralidharaVaishnavi Janardhan

Journal:   International Journal of Scientific Research and Management (IJSRM) Year: 2016 Vol: 4 (9)Pages: 4636-4664
© 2026 ScienceGate Book Chapters — All rights reserved.