Saha, Sayantan (2025) Zero-trust database systems: The new frontier in data security. World Journal of Advanced Research and Reviews, 26 (1). pp. 829-841. ISSN 2581-9615
![WJARR-2025-1112.pdf [thumbnail of WJARR-2025-1112.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1112.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Zero-trust database systems represent a paradigm shift in data security, replacing traditional perimeter-based approaches with a "never trust, always verify" philosophy. By implementing continuous validation for every database query and interaction, organizations can dramatically reduce unauthorized access incidents while improving data availability for legitimate users. This article explores the key components of zero-trust database architectures, including multi-factor authentication, fine-grained access controls, and query provenance mechanisms. Real-world applications in healthcare and social media demonstrate how these systems protect sensitive information while maintaining operational efficiency. Despite implementation challenges related to performance overhead and compliance automation, the security benefits make zero-trust increasingly attractive for sectors handling sensitive data, with documented improvements in breach prevention, detection time, and overall security posture.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.1.1112 |
Uncontrolled Keywords: | Zero-Trust Architecture; Data Security; Multi-Factor Authentication; Fine-Grained Access Control; Query Provenance |
Depositing User: | Editor WJARR |
Date Deposited: | 22 Jul 2025 23:32 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/1694 |