A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats

Research output: Contribution to journalReview articlepeer-review

5 Scopus citations

Abstract

Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric tools and techniques intended to meet the unique security requirements within cloud-native environments. Specifically, a variety of solutions are covered, such as runtime protection platforms for real-time threat detection and responses, cloud-native endpoint security solutions for ensuring trust and resilience in dynamic contexts, and service mesh technologies for secure service-to-service communication. Furthermore, we examine the roles of cloud-native encryption, cloud-native identity and access management, and container image scanning technologies in protecting containerized applications and preserving data privacy in transit and at rest. The importance of threat detection and response systems, cloud-native security information and event management (SIEM) solutions, and network security are also covered to strengthen trust and transparency in cloud-native security. We also present a thorough case study that demonstrates how security measures are applied across multiple layers, including application, network, infrastructure, and security, and compliance, to ensure holistic security in a cloud-native architecture. By investigating these privacy-enhancing methods and technologies, organizations may improve the security posture of their cloud-native implementations, reducing risks and ensuring the trustworthiness of their information and applications in the ever-changing ecosystem of today’s digital landscape.

Original languageEnglish
Article number2350
JournalSensors
Volume25
Issue number8
DOIs
StatePublished - Apr 2025

Keywords

  • AI-driven threat detection
  • DevSecOps
  • cloud-native security
  • cyber security
  • privacy-enhancing security
  • trust management
  • zero-trust security

Fingerprint

Dive into the research topics of 'A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats'. Together they form a unique fingerprint.

Cite this