Securing cloud computing networks using secure access protocols on zero trust architecture
Author(s): Samir Qaisar Ajmi and Sadiq Sahip Majeed
Abstract: As cloud computing becomes the backbone of modern IT infrastructures, ensuring the security of cloud networks has emerged as a critical concern. Traditional perimeter-based security models are increasingly inadequate in addressing the dynamic, distributed, and remote nature of cloud environment. This paper explores the implementation of secure access protocols through the lens of Zero Trust Architecture (ZTA) a paradigm that operates on the principle of “never trust, always verify”. Focusing on a case study approach, the research analyzes how Zero Trust principles-such as continuous authentication micro-segmentation least privilege access and strong identity verification can be integrated with secure access protocols like TLS, IPSec and SASE to fortify cloud computing network against evolving threats. The study highlights practical deployment strategies, identifies challenges in adoption and evaluates the performance and security benefits of ZTA in a cloud-native context. The finding underscore the importance of shifting from implicit tryst models to dynamic context-aware access control mechanisms to build resilient and secure cloud infrastructures.
Samir Qaisar Ajmi, Sadiq Sahip Majeed. Securing cloud computing networks using secure access protocols on zero trust architecture. Int J Comput Artif Intell 2025;6(1):159-163. DOI: 10.33545/27076571.2025.v6.i1b.146