Adaptive Zero Trust Security: Integrating Artificial Intelligence for Dynamic Cloud Security
DOI:
https://doi.org/10.22399/ijcesen.4901Keywords:
Zero Trust Architecture, Artificial Intelligence, Cloud Security, Adaptive Security, Dynamic Trust ModelsAbstract
Zero Trust Architecture(ZTA) has become a widely adopted security approach for modern cloud and hybrid systems, built on the principle that no user, device, or service should be trusted by default. While this model has improved security compared with traditional perimeter-based methods, it still faces multiple challenges. They frequently depend on static access policies, tightly coupled identity and access management systems, and complex integration across heterogeneous platforms. As organizations expand into multi-cloud environments, edge computing, and highly distributed workloads, these limitations make it difficult for ZTA to keep pace with real-world complexity. This article presents a conceptual view on the evolution of Zero Trust beyond static policy enforcement. The article highlights why current architectures struggle to adapt changes in user behavior, workload context, and threat conditions. Artificial Intelligence can play a critical role in strengthening Zero Trust by helping systems interpret behavioral signals, understand patterns, and adjust policies more dynamically. Instead of treating Zero Trust as a fixed architecture, this perspective frames it as a continuously adapting trust model supported by AI-driven insights. This article outlines a path toward more resilient, context-aware, and scalable security in cloud environments.
References
[1] Naeem Firdous Syed, et al., "Zero Trust Architecture (ZTA): A Comprehensive Survey," IEEE Xplore, 12 May 2022. Available: https://ieeexplore.ieee.org/document/9773102
[2] Muhammad Liman Gambo, Ahmad Almulhem, "Zero Trust Architecture: A Systematic Literature Review," arXiv (Computer Science – Cryptography & Security), 07 Feb 2025. Available: https://arxiv.org/html/2503.11659v1
[3] Prajwalasimha S N, et al., "Zero Trust Architectures Empowered by AI: A Paradigm Shift in Cloud‑Edge Security," 2025 3rd International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 24 September 2025. Available: https://ieeexplore.ieee.org/document/11166875
[4] Dr. Layla Kuwari, "A Survey on Zero Trust Security Architecture in Cloud Ecosystems," International Journal of Cloud Computing and Database Management, 15-02-2025. Available: https://www.computersciencejournals.com/ijccdm/article/81/6-1-8-350.pdf
[5] Gaurav Shekhar, "Dynamic Trust in Cloud Environments: Transforming Enterprise Security Models Through Zero Trust," IEEE Chicago, 2024. Available: https://ieeechicago.org/dynamic-trust-in-cloud-environments-transforming-enterprise-security-models-through-zero-trust/
[6] Lakshman Kumar Jamili, et al., "Artificial Intelligence for Adaptive Risk Assessment in Cloud-Based Security Frameworks," 2025 International Conference on Networks and Cryptology (NETCRYPT), 12 August 2025. Available: https://ieeexplore.ieee.org/document/11102751
[7] K. Chokkanathan, "AI‑Driven Zero Trust Architecture: Enhancing Cyber Defense," IEEE Xplore, 01 January 2025. Available: https://ieeexplore.ieee.org/document/10816746
[8] Gopalakrishna Karamchand, "Zero Trust and AI: A Synergistic Approach to Next‑Generation Cyber Threat Mitigation," World Journal of Advanced Research and Reviews, 18 December 2024. Available: https://wjarr.com/sites/default/files/WJARR-2024-3883.pdf
[9] Secure Systems Research Center (SSRC), Technology Innovation Institute, "Toward Trustworthy AI: A Zero‑Trust Framework for Foundational Models," Wiley Science & Engineering Content Hub, 2024. Available: https://content.knowledgehub.wiley.com/toward-trustworthy-ai-a-zero-trust-framework-for-foundational-models/
[10] Sudipto Baral et al., "An Adaptive End‑to‑End IoT Security Framework Using Explainable AI and LLMs," arXiv, 20 Sep 2024. Available: https://arxiv.org/html/2409.13177v1
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.