International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Zero Trust Architecture: Never Trust, Always Verify |
|---|---|
| ABSTRACT | The rapid growth of Internet of Things (IoT) devices has significantly increased cybersecurity risks due to weak authentication mechanisms, centralized trust models, and limited device security capabilities. Traditional perimeter-based security approaches are insufficient to protect distributed IoT environments from threats such as device impersonation, unauthorized access, data tampering, and privacy breaches. The objective of this project is to design a Blockchain-Enabled Zero Trust Architecture (ZTA) framework that ensures secure, decentralized, and privacy-preserving communication in IoT ecosystems. The proposed methodology integrates blockchain technology with Zero Trust principles to eliminate implicit trust and enforce continuous authentication and authorization. A permissioned blockchain network is used to store tamper-proof device identities and access logs, while smart contracts automate policy enforcement. Zero Trust mechanisms such as least-privilege access, continuous monitoring, and strict identity verification are implemented. Additionally, encryption and cryptographic hashing techniques are applied to protect sensitive data. |
| AUTHOR | PROF. SHEGAR S.R., BHOR PRATIKSHA GANPAT Assistant Professor, Department of Computer, Samarth College of Engineering & Management, Belhe, Pune, Maharashtra, India PG Student, Department of Computer, Samarth College of Engineering & Management, Belhe, Pune, Maharashtra, India |
| VOLUME | 184 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1405046 |
| pdf/46_Zero Trust Architecture Never Trust, Always Verify.pdf | |
| KEYWORDS | |
| References | [1] Implementing a zero trust architecture, Alper Kerman, Oliver Borchert, Scott Rose, Eileen Division, Allen Tan, National Institute of Standards and Technology, October 2020. [2] A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments, RamaswamyChandramouli, Zack Butcher, NIST Special Publication,2023. [3] An Implementation Method of Zero-trust Architecture, Tao Chuan1 a , Yao Lv1 , Zhenfei Qi1 , Linjiang Xie1 and Wei Guo1 Information Center of Yunnan Power Grid Co. Ltd. ,2020. [4] Shashi Kindervag's seminal work on ZTA (2010) provides a foundation for redefining security paradigms, while Moffat (2019) explores its practical implementation in enhancing cybersecurity. [5] Kumar and Sharma's study (2013) delves into the design and implementation of a hierarchical login system, offering insights into its structure and benefits. [6] Johnson and Smith's research (2017) explores the integration of innovative features to foster dynamic engagement in educational settings, addressing the need for transformative user experiences. [7] Gupta and Singh's analysis (2018) discusses the scalability challenges faced by educational content-sharing platforms, emphasizing the importance of addressing these issues for broader adoption. |