TY - JOUR
T1 - A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats
AU - Arif, Tuba
AU - Jo, Byunghyun
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© 2025 by the authors.
PY - 2025/4
Y1 - 2025/4
N2 - Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service mesh technologies for secure service-to-service communication. Furthermore, we examine the roles of cloud-native encryption, cloud-native identity and access management, and container image scanning technologies in protecting containerized applications and preserving data privacy in transit and at rest. The importance of threat detection and response systems, cloud-native security information and event management (SIEM) solutions, and network security are also covered to strengthen trust and transparency in cloud-native security. We also present a thorough case study that demonstrates how security measures are applied across multiple layers, including application, network, infrastructure, and security, and compliance, to ensure holistic security in a cloud-native architecture. By investigating these privacy-enhancing methods and technologies, organizations may improve the security posture of their cloud-native implementations, reducing risks and ensuring the trustworthiness of their information and applications in the ever-changing ecosystem of today’s digital landscape.
AB - Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service mesh technologies for secure service-to-service communication. Furthermore, we examine the roles of cloud-native encryption, cloud-native identity and access management, and container image scanning technologies in protecting containerized applications and preserving data privacy in transit and at rest. The importance of threat detection and response systems, cloud-native security information and event management (SIEM) solutions, and network security are also covered to strengthen trust and transparency in cloud-native security. We also present a thorough case study that demonstrates how security measures are applied across multiple layers, including application, network, infrastructure, and security, and compliance, to ensure holistic security in a cloud-native architecture. By investigating these privacy-enhancing methods and technologies, organizations may improve the security posture of their cloud-native implementations, reducing risks and ensuring the trustworthiness of their information and applications in the ever-changing ecosystem of today’s digital landscape.
KW - AI-driven threat detection
KW - DevSecOps
KW - cloud-native security
KW - cyber security
KW - privacy-enhancing security
KW - trust management
KW - zero-trust security
UR - https://www.scopus.com/pages/publications/105003773911
U2 - 10.3390/s25082350
DO - 10.3390/s25082350
M3 - Review article
C2 - 40285041
AN - SCOPUS:105003773911
SN - 1424-8220
VL - 25
JO - Sensors
JF - Sensors
IS - 8
M1 - 2350
ER -