Open Access iconOpen Access

ARTICLE

crossmark

An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services

Victor Otieno Mony*, Anselemo Peters Ikoha, Roselida O. Maroko

Department of Information Technology, School of Computing & Informatics, Kibabii University, Bungoma, 50200, Kenya

* Corresponding Author: Victor Otieno Mony. Email: email

Journal of Cyber Security 2025, 7, 395-415. https://doi.org/10.32604/jcs.2025.070952

Abstract

The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an Intelligent Zero Trust Architecture model tailored to mitigate authentication-related threats in Cloud-Based Services environments. Data was sourced from public repositories, including Kaggle and the National Institute for Standards and Technology MITRE Corporation’s Adversarial Tactics, Techniques, & Common Knowledge (ATT&CK) framework. The study utilized two trust signals: Behavioral targeting system users and Contextual targeting system devices. Based on the trust signals, two machine learning models—Keystroke Dynamics and Device Location—were developed using Binary Logistic Regression, achieving a combined average accuracy of 80.63%, with a residual ineffectiveness rate of 19.37%. The Intelligent Zero-Trust Architecture Threat Mitigation Model was introduced to reclassify threat severity scores, resulting in the downgrading of all authentication threats to Low Severity, demonstrating a mitigation effectiveness exceeding 80%. This research contributes to the field of cybersecurity by presenting a validated, intelligent, and context-aware Intelligent Zero-Trust Architecture model capable of enhancing identity and access management in dynamic cloud environments. The findings offer actionable insights for cloud architects, cybersecurity professionals, and policymakers aiming to strengthen trust, reduce attack surfaces, and improve threat resilience across digital infrastructure.

Keywords

Cloud-based services; zero trust architecture; intelligent zero trust architecture; cloud computing; cloud authentication; machine learning; binary logistics regression; loss function; holdout validation; confusion matrix; precision rates; negative predictive value

Cite This Article

APA Style
Mony, V.O., Ikoha, A.P., Maroko, R.O. (2025). An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services. Journal of Cyber Security, 7(1), 395–415. https://doi.org/10.32604/jcs.2025.070952
Vancouver Style
Mony VO, Ikoha AP, Maroko RO. An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services. J Cyber Secur. 2025;7(1):395–415. https://doi.org/10.32604/jcs.2025.070952
IEEE Style
V. O. Mony, A. P. Ikoha, and R. O. Maroko, “An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services,” J. Cyber Secur., vol. 7, no. 1, pp. 395–415, 2025. https://doi.org/10.32604/jcs.2025.070952



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 335

    View

  • 179

    Download

  • 0

    Like

Share Link