The emerging zero trust security shows great promises of vastly enhanced security, usability, data protection and governance in cloud computing environments, which assumes that all participants, systems, or services operating from within the cloud-based perimeter are not trusted by default and instead must verify everything trying to access the cloud-based system. In cloud-based system, the traditional perimeter security approaches are vulnerable for data breaches and cyberattacks. The zero-trust model provides new security model that requires restrict access control and trusts nothing by default for any user, applications, or services in both inside and outside a cloud-based system perimeter. The zero trust specifically effect in cloud computing environment, where enterprises should not inherently trust any users, application, and any attempt to access a system or application must be verified before granting access. The zero-trust security model can significantly improve the security of cloud by creates a map of what it has in the cloud and implement strong access control, including multi-factor authentication, adaptive access control, risk-based adaptive authentication, artificial intelligence enabled dynamic security policies, and more.
The aim of this special issue is to foster novel and multidisciplinary approaches that improve the security in cloud environments by addressing challenges in zero trust security in cloud environments, including fitting with legacy network-centric methods, strengthening security of user and application centric approaches, supporting access to internal apps from any device anywhere, etc.
This special issue will focus on (but not limited to) the following topics:
Zero trust methods and models for cloud security solutions
Zero trust architecture in cloud computing
Zero trust security architecture/framework in cloud computing
Micro-segmentation in cloud systems
Autonomic security for zero trust cloud-based systems
Real-time access control and optimisation
Granular perimeter security
Multifactor authentication in zero trust model
Governance policies in cloud computing
Zero trust identity management multi-factor authentication (MFA)
Access privilege in zero trust enabled cloud environments
Cyberattacks in zero trust environments
Granular access control and security
Implementation of zero trust security in cloud computing
Machine learning enabled zero trust security in cloud computing
Submission Format :
The submitted papers must be written in English and describe original research which is not published nor currently under review by other journals or conferences. Author guidelines for preparation of manuscript can be found at https://www.journals.elsevier.com/computers-and-security/.
Submission Guidelines :
All manuscripts and any supplementary material should be submitted through the Elsevier journal Computer & Security submission system at https://ees.elsevier.com/cose/. The authors must select VSI:ZTSecurity when they reach the journal type selection.
Submission Deadline: Feb 1, 2021
First Round of Reviews: Mar 31, 2021
Second Round of Reviews: May 31, 2021
Final manuscript due: Jul 31, 2021
List of Guest Editors :
Shancang Li, University of the West of England, Bristol BS16 1QY, UK, email@example.com
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA, firstname.lastname@example.org
Houbing Song, Embry-Riddle Aeronautical University, USA, email@example.com
Hongwei Li, University of Electronic Science and Technology of China, China, firstname.lastname@example.org