Corresponding author: Oluwatosin Oladayo ARAMIDE
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0.
Zero-trust identity principles in next-gen networks: AI-driven continuous verification
for secure digital ecosystems
Oluwatosin Oladayo ARAMIDE
*
Department Network and Storage Layer, Netapp Ireland Limited, Ireland.
World Journal of Advanced Research and Reviews, 2024, 23(03), 3304-3316
Publication history: Received on 20 July 2024; revised on 23 September 2024; accepted on 28 September 2024
Article DOI: https://doi.org/10.30574/wjarr.2024.23.3.2656
Abstract
With the rise in the decentralization of digital ecosystems, identity has come out as the new pillar of cybersecurity in
the next generation networks. However, with the increasing complexity of the threats that include the hybrid, cloud-
native, and edge computing, traditional models relying on perimeters cannot solve the problem as well as before. Zero
Trust Architecture (ZTA) alters the security paradigm by applying the concept of never trust, always verify, so that
everything must constantly be authenticated and dynamically authorized by everyone and everything. In this paper we
will be examining how Zero Trust is changing the way identity management is done by eliminating static credentials
and role-based access with real-time verification using behavior. At the heart of such transformation lies the inclusion
of Artificial Intelligence (AI), which facilitates the constant evaluation of trust on the basis of any contextual data such
as device posture, user behavior, geolocation and access patterns. We hypothesize a dynamic trust model that leverages
machine-learning models to generate dynamically adaptive trust scores and make policy decisions in execution. The
model supports the main issues in identity lifecycle, detection of threats, and risk aware access control. The paper also
discusses security, scalability, and privacy of using AI to insert identity verification workflow. In this way, we will show
how smart automation can reinforce access control in next-gen networks by applying Zero Trust principles that provide
a robust, scalable, and context-aware defense to attackers based on identity in next-gen networks.
Keywords: Zero Trust Architecture (ZTA); Identity Management; Next-Generation Networks; Artificial Intelligence;
Dynamic Trust Assessment; Cybersecurity
1. Introduction
With the changing environment of digital connectivity, the traditional barriers of enterprise networks are fast
evaporating. This way, cloud computing, mobile-first ecosystems, hybrid workplaces, and Internet of Things (IoT)
products have changed the user, device, application, and data relationship. With organizations also moving to a
distributed architecture and using next generation network infrastructures like 5G, edge computing, and software-
defined networks (SDN), the attack surface has grown exponentially. This development has made the old perimeter
security paradigm which is based on implicit trust of the internal actors obsolete and extremely susceptible to more
advanced threats in the cyber space.
To solve these problems, Zero Trust Architecture (ZTA) has emerged as a revolutionary approach that does not trust
any user, device, or service implicitly, either inside or outside the network perimeter. Based on the fundamental
principle of "never trust, always verify", Zero Trust reshapes security as a continuous process of dynamic verification,
strong access control, and contextual policy enforcement. Identity is at the center here and is the new security boundary.
Unlike static credentials-based legacy Identity and Access Management (IAM) solutions, Zero Trust demands
continuous identity validation and dynamic access decisions on the basis of current context and risk.