Designing Resilient Cloud Computing Infrastructures through Advanced Zero Trust Architecture and Continuous Verification Mechanisms
Keywords:
Zero Trust Architecture, Cloud Computing Security, Continuous Verification, Identity Governance, System Resilience, Distributed Systems, Policy Drift, Security OrchestrationAbstract
Zero Trust Architecture in cloud computing is often framed as a deterministic security upgrade, yet operational data suggests a more unstable reality where continuous verification introduces computational overheads, identity fragmentation, and policy drift that erode system resilience over time. The proposed investigation interrogates this contradiction by constructing a layered cloud infrastructure model where identity, device posture, and behavioral telemetry are continuously re-evaluated under adversarial simulation, exposing nonlinear degradation patterns rather than linear improvements. The results suggest resilience is not a property of enforcement intensity but of adaptive equilibrium between verification frequency and system tolerance, a balance rarely achieved in production deployments. The argument is uncomfortable. It challenges assumptions.
The study positions resilience not as a fixed outcome but as a fluctuating condition shaped by latency thresholds, identity entropy, and orchestration inefficiencies, revealing that excessive verification can paradoxically expand attack surfaces through synchronization failures and policy misalignment. Continuous verification becomes both safeguard and destabilizer, depending on architectural discipline and feedback-loop governance. This forces a choice. The system either stabilizes or collapses under its own safeguards.
References
[1] Kindervag, J. Zero Trust Security Model For Modern Networks Forrester Research 2010
[2] Rose, S., Borchert, O., Mitchell, S. Zero Trust Architecture NIST Special Publication 2020
[3] Gilman, E., Barth, D. Zero Trust Networks O Reilly Media 2017
[4] Zissis, D., Lekkas, D. Addressing cloud computing security issues Future Generation Computer Systems 2012
[5] Goswami, V. (2026). Cost and Performance Trade-offs in MuleSoft vs Custom Spring Boot Integration Platforms. International Journal of AI, BigData, Computational and Management Studies, 7(1), 228-232. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V7I1P134
[6] Behl, A., Behl, K. Cybersecurity and Cyberwar What Everyone Needs to Know Oxford University Press 2016
[7] Humayun, M., et al. Cybersecurity for cloud computing Journal of Information Security 2020
[8] Goswami, V. (2026). A Comparative Study of Synchronous vs Asynchronous API Orchestration in MuleSoft-Led Enterprise Modernization. International Journal of Emerging Trends in Computer Science and Information Technology, 7(1), 101-104. https://doi.org/10.63282/3050-9246.IJETCSIT-V7I1P114
[9] Chen, D., Zhao, H. Data security and privacy protection issues in cloud computing IEEE 2012
[10] Zhang, Q., Chen, M. Cloud computing state of the art and research challenges Journal of Internet Services 2010
[11] Abomhara, M., Koien, G. Cyber security and the internet of things Journal of Cyber Security 2015
[12] Goswami, V. (2026). Patterns and Anti-Patterns in Migrating Monolithic Integration Layers to Cloud-Native Spring Boot Microservices. IJSAT-International Journal on Science and Technology, 17(1), 1–3. https://doi.org/10.71097/IJSAT.v17.i1.10336
[13] Modi, C., et al. A survey on security issues and solutions at different layers of cloud computing Journal of Supercomputing 2013
[14] Fernandes, D., Soares, L. Security issues in cloud environments International Journal of Information Security 2014
[15] Ali, M., Khan, S. Security in cloud computing Opportunities and challenges Information Sciences 2015
[16] Singh, A., Chatterjee, K. Cloud security issues and challenges Journal of Network and Computer Applications 2017
[17] Rittinghouse, J., Ransome, J. Cloud Computing Implementation Management and Security CRC Press 2017
[18] Pearson, S. Privacy security and trust in cloud computing Springer 2013
[19] Takabi, H., Joshi, J. Security and privacy challenges in cloud computing IEEE Security and Privacy 2010
[20] Subashini, S., Kavitha, V. Survey on security issues in cloud computing Journal of Network and Computer Applications 2011
[21] Kaufman, L. Data security in the world of cloud computing IEEE Security and Privacy 2009
[22] Goswami, V. (2026). Securing Enterprise APIs in Zero-Trust Architectures: Practical Implementations with Apigee and Cloud IAM. International Journal on Science and Technology (IJSAT), 17(1), 1–6. https://doi.org/10.71097/IJSAT.v17.i1.10425
[23] Stallings, W. Network Security Essentials Pearson 2016
[24] Pahl, C. Containerization and the PaaS cloud IEEE Cloud Computing 2015
Downloads
Published
Issue
Section
Deprecated: urlencode(): Passing null to parameter #1 ($string) of type string is deprecated in /home/u877385332/domains/ijraics.com/public_html/plugins/generic/pflPlugin/PflPlugin.php on line 216



