Review Article

A Survey on Zero Trust Architecture: Challenges and Future Trends

Table 1

Comparison of zero trust architectures.

LiteratureImplementationAdvantageDisadvantage

Kindervag [4]Extract network data to the management center using DANInspect and analyze data in real timeNetwork complexity increases and user communication delay increases
DeCusatis et al. [5]Using steganography and overwriting methods, the authentication token is embedded in the TCP request packet and the authentication headerIncreased security for businesses in cloud computing environments and prevents unwanted fingerprinting of protected resourcesNo protection at layer 7, not comprehensive enough
Rose et al. [6]Automatically link new APIs to existing service mesh categories by using machine learning-based smart association modelsSimplify the creation, management, and monitoring of APIsDifficult to achieve in real environment
Sultana et al. [7]The system combines zero trust with blockchain, the blockchain is used to protect sensitive information, and zero trust realizes comprehensive protection of medical dataCombining blockchain with zero trustLow efficiency
Weever et al. [8]A zero trust network security model in a containerized environmentReduced data leakage in containerized environmentsBehavioral analysis and data leak detection are not implemented
Ramezanpour and Jagannath [9]Using artificial intelligence for intelligent detection, assessment, and decision-makingImprove the efficiency of ZTA components in processing big dataOnly at the theoretical level
Tian et al. [10]Zero trust approach based on BLP and BIBA modelsSet different weights based on confidentiality and integrity requirementsThe weight distribution is not reasonable enough
Ghate et al. [11]Automate fine-grained access control with generalized attribute relation extractionLow costFailed to measure performance in a real environment