Applying zero trust architecture and probability-based authentication to preserve security and privacy of data in the cloud

Yvette Colomb, Peter White, Rafiqul Islam, Abeer Alsadoon

Research output: Chapter in Book / Conference PaperChapter

Abstract

With the convenience of Cloud computing (CC) comes changes and challenges to cybersecurity. Organisational networks have changed, and the traditional perimeter-style defence is ineffective in CC architecture. Tracking the location of data processes within CC poses challenges to organisations to preserve data privacy (Sun, IEEE Access 7:147420–147452, 2019). Zero trust (ZT) architecture offers a way to use familiar network, cyber, and software security tools in a purpose-fit way to protect data in the Cloud. Probability-based authentication (PBA) uses more identifiers about user entities such as device, location, and activity to help identify bad actors and restrict access (Wiefling S, Lo Iacono L, Dürmuth M, Is this really you? An empirical study on risk-based authentication applied in the wild. In: ICT systems security and privacy protection, Cham, pp 134–148, 2019). This chapter provides an overview of how to apply security and preserve data privacy in the Cloud.

Original languageEnglish
Title of host publicationEmerging Trends in Cybersecurity Applications
EditorsKevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun
Place of PublicationSwitzerland
PublisherSpringer
Pages137-169
Number of pages33
ISBN (Electronic)9783031096402
ISBN (Print)9783031096396
DOIs
Publication statusPublished - 1 Jan 2022

Fingerprint

Dive into the research topics of 'Applying zero trust architecture and probability-based authentication to preserve security and privacy of data in the cloud'. Together they form a unique fingerprint.

Cite this