Application of Data Security Models in Zero - Trust Architecture from the Data Assets Perspectives
DOI:
https://doi.org/10.48017/dj.v11iSpecial_1.3741Keywords:
data assets, zero-trust architecture, data security mode, access control, security policyAbstract
Today, data assets have become the core assets of enterprises and organizations, and their security is of utmost importance. The traditional network security architecture has revealed many limitations in protecting data assets, giving rise to the zero - trust architecture. This paper deeply analyzes the data security model of the zero - trust architecture from the perspective of data assets, and elaborates on its design key points, including data classification and grading, identity and access management, etc. At the same time, it explores its applications in scenarios such as enterprise data centers and cloud computing, analyzes the challenges in technology, management, and legal compliance during the implementation process, and proposes corresponding countermeasures. The aim is to provide a reference for enterprises and organizations to protect the security of data assets.
Traditional network security architectures revealed significant limitations in protecting data assets, particularly in an increasingly interconnected and global environment. The need for zero-trust architecture has emerged as a promising paradigm, highlighting the "never trust, always verify" principles to ensure data asset security. The study investigates the application of zero-trust architecture in practical scenarios, including enterprise data centers and cloud computing environments, etc, which are increasingly critical in modern IT infrastructures. It also explored on the challenges that organizations faced in implementing zero-trust architecture, especially in areas of technology, management, and legal compliance. To address these issues, the paper proposed countermeasure mechanisms that support sustainable and resilient operations in the digital age.
Metrics
References
AWS. (2023).AWS Key Management Service Best Practices. https://aws.amazon.com/kms/
Gartner. (2023). Market Guide for Zero Trust Network Access.
Istio. (2023). Service Mesh Security Documentation. https://istio.io/latest/docs/concepts/security/
Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research.
Microsoft. (2023). Azure Purview Data Governance.https://azure.microsoft.com/en-us/products/purview
NIST. (2020). SP 800-207: Zero Trust Architecture. U.S. Department of Commerce.
Siemens. (2023). IoT Security in Edge Computing. https://siemens.com/iot-security.
Darktrace. (2023). AI-Driven Threat Detection Report.
ARM. (2023). RISC-V Optimization for IoT Security. ARM Holdings.
NIST. (2023). Post-Quantum Cryptography Standards. National Institute of Standards and Technology.
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2023). Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology, 10(2), 1–19.
FireEye. (2020). Sunburst: Sophisticated Cyber Espionage Attack. FireEye Threat Research.
IBM. (2023). Cost of a Data Breach Report. IBM Security.
IDC. (2023). Worldwide DataSphere Forecast, 2023–2027. International Data Corporation.
Wang, Y., & Zhang, L. (2022). Consumer Preferences for Home Decoration Materials in Different Regions. Journal of Consumer Behavior Research, 18(3), 45-60.
Yue, S. & Qiang, Z. (2022). Analysis of Consumer Purchase decision-making Process in Home improvement Market. Monthly Journal of Market Research, 35 (6), 78-90.
Zhang S., & Li, S. (2023). Research on Market Trend of Aluminum Alloy Home Decoration Doors and Windows. Journal of Architectural Decoration Materials, 21 (2), 123-135.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Fangshu Hu, Jessa Frida Festijo

This work is licensed under a Creative Commons Attribution 4.0 International License.
The Diversitas Journal expresses that the articles are the sole responsibility of the Authors, who are familiar with Brazilian and international legislation.
Articles are peer-reviewed and care should be taken to warn of the possible incidence of plagiarism. However, plagiarism is an indisputable action by the authors.
The violation of copyright is a crime, provided for in article 184 of the Brazilian Penal Code: “Art. 184 Violating copyright and related rights: Penalty - detention, from 3 (three) months to 1 (one) year, or fine. § 1 If the violation consists of total or partial reproduction, for the purpose of direct or indirect profit, by any means or process, of intellectual work, interpretation, performance or phonogram, without the express authorization of the author, the performer, the producer , as the case may be, or whoever represents them: Penalty - imprisonment, from 2 (two) to 4 (four) years, and a fine. ”











