NEXT-GENERATION ENTERPRISE SECURITY THROUGH ZERO-TRUST, PRIVACY AND BLOCKCHAIN TECHNOLOGIES

Authors

  • Siva Prakash Bikka Rivier University, USA Author

Keywords:

Zero-Trust Architecture, Data Privacy Compliance, Blockchain Security, Cybersecurity Automation, Enterprise Security Framework

Abstract

Modern enterprise environments require advanced security frameworks to address evolving threats and compliance requirements. The article examines Zero-Trust Security, Data Privacy and Compliance, and Blockchain technology implementations across healthcare, financial services, and public sector applications. By investigating the integration of artificial intelligence, cloud computing, and cybersecurity measures, the study demonstrates the effectiveness of contemporary security approaches in protecting critical assets while maintaining operational efficiency. The article provides detailed insights into successful implementation frameworks, resource allocation strategies, and performance metrics across different security domains, offering practical guidance for organizations pursuing enhanced security postures.

References

Sandeep Reddy Gudimetla, "Zero Trust Security Model: Implementation Strategies And Effectiveness Analysis," International Research Journal of Engineering and Technology, Volume 11, Issue 05, 2024. Available: https://www.irjet.net/archives/V11/i5/IRJET-V11I5167.pdf

Saurabh Sarkar and Mariyam Jahira, "The Evolution of Zero Trust in the Financial Sector: Strengthening Cybersecurity," Synpulse, 2024. Available: https://www.synpulse.com/en/insights/the-evolution-of-zero-trust-in-the-financial-sector-strengthening-cybersecurity

Francis Ohu, "Data Privacy Implementation and Compliance: A Strategic Guide for Enterprises," LinkedIn, 2024. Available: https://www.linkedin.com/pulse/data-privacy-implementation-compliance-strategic-guide-francis-ohu-yihgf

Fei Bu, et al., "Privacy by Design” implementation: Information system engineers’ perspective," International Journal of Information Management, Volume 53, 2020. Available: https://www.sciencedirect.com/science/article/abs/pii/S0268401219308606

MD. RIFAT HOSSAIN, et al., "A Comprehensive Analysis of Blockchain Technology and Consensus Protocols Across Multilayered Framework," IEEE, Volume 12, 2024. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10510893

Milan Chauhan and Stavros Shiaeles, "An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions," MDPI, Volume 3, Issue 3, 2023. Available: https://www.mdpi.com/2673-8732/3/3/18#metrics

Anomali, "Building a Future-Proof Cybersecurity Strategy: A CISO's Roadmap," 2024. Available: https://www.anomali.com/blog/building-a-future-proof-cybersecurity-strategy-a-cisos-roadmap

dig8ital, "Exploring the Top Security Architecture Frameworks for Maximum Protection.”. Available: https://dig8ital.com/post/security-architecture-frameworks/

Published

2025-01-22

How to Cite

Siva Prakash Bikka. (2025). NEXT-GENERATION ENTERPRISE SECURITY THROUGH ZERO-TRUST, PRIVACY AND BLOCKCHAIN TECHNOLOGIES. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 8(1), 574-587. http://ijrcait.com/index.php/home/article/view/IJRCAIT_08_01_045