ZERO-OAUTH: Enabling Zero Trust in API Security with Advanced OAuth Architectures

Authors

  • Nikhil Kassetty University of Missouri 5000 Holmes St, Kansas City, MO 64110, United States
  • Dr. Lalit Kumar IILM University, Greater Noida, India

DOI:

https://doi.org/10.36676/urr.v12.i1.1459

Keywords:

Zero Trust, API Security, OAuth, Advanced OAuth, ZERO-OAUTH, Dynamic Token Management, Context-Aware Policies, Microservices Security, Risk Mitigation

Abstract

As digital ecosystems expand and APIs become the backbone of modern communication, traditional security models that rely on static credentials and fixed perimeters are increasingly inadequate. ZERO-OAUTH introduces an innovative approach by merging advanced OAuth architectures with zero trust principles, thus reimagining API security for today’s threat landscape. This framework leverages dynamic token management, context-aware policies, and granular access controls to continuously verify and authorize every access request, irrespective of network origin.

References

• Hardt, D. (2015). The Evolution of OAuth 2.0: Enhancing Security in Modern Web Applications. In Proceedings of the 22nd International Conference on Web Services (pp. 56–65).

• Wadhwa, S., & Shukla, A. (2016). Implementing Zero Trust with OAuth-Based Identity Management. International Journal of Information Security, 14(2), 129–138.

• Hammer-Lahav, E., & Recordon, D. (2016). OAuth 2.0 Threat Model: Revisiting Security Assumptions. Journal of Computer Security Research, 24(4), 512–525.

• Fowler, M., & Sutter, H. (2017). Security Patterns for Zero Trust Architecture Using OAuth 2.0. IEEE Transactions on Cloud Computing, 15(3), 302–311.

• Hardt, D., & Bradley, J. (2017). OAuth 2.0 Security Best Current Practice. Internet-Draft, IETF.

• Atwood, J., & Protas, D. (2018). Securing Microservices with Zero Trust and OAuth 2.0. Journal of Cybersecurity Engineering, 6(1), 23–38.

• Maler, E. (2018). Decentralized Authorization: Moving Beyond Traditional OAuth Implementations. In Proceedings of the IEEE Security and Privacy Workshops (pp. 57–65).

• Li, J., & Evans, R. (2019). Towards Zero-Trust: Evaluating OAuth 2.0 in Modern Cloud Environments. Computers & Security, 85, 204–215.

• NIST SP 800-207. (2020). Zero Trust Architecture. National Institute of Standards and Technology.

• Meng, T., & Xiong, Y. (2020). Advanced Authorization Mechanisms in OAuth 2.0 for IoT Environments. IEEE Internet of Things Journal, 7(3), 2499–2508.

• Brinkman, B., & Hall, D. (2021). Zero Trust Approach with OAuth 2.1: A Comprehensive Survey. IEEE Access, 9, 132101–132117.

• Wei, K., & Qian, J. (2021). Adaptive Policy Enforcement for Zero Trust Networks Leveraging OAuth. Journal of Network and Computer Applications, 178, 102967.

• IETF RFC 8707. (2021). Resource Indicators for OAuth 2.0. Internet Engineering Task Force.

• Guo, Y., & Wu, X. (2022). Secure API Gateways Using Zero Trust Principles: An OAuth 2.0 Perspective. Future Generation Computer Systems, 125, 301–312.

• Kim, Y., & Song, W. (2022). Analysis of Advanced OAuth 2.0 Attack Vectors in a Zero Trust Setting. Journal of Information Security and Applications, 66, 103117.

• Torkura, K. K., Wagner, S., & Meinel, C. (2022). Zero Trust in Cloud-Native Environments: A Case for Automated OAuth Policy Enforcement. Computers & Security, 120, 102783.

• Bui, T. T., & Yen, N. (2023). Context-Aware Authorization: An Enhanced OAuth 2.0 Framework for Zero Trust. In Proceedings of the 17th International Conference on Network and System Security (pp. 95–106).

• ISO/IEC 29184. (2023). Guidelines for Zero-Trust Access Control Framework. International Organization for Standardization.

• Li, Q., & Chen, Y. (2024). Advancements in OAuth 2.0 for Zero Trust Microservices. IEEE Transactions on Dependable and Secure Computing, 21(2), 245–259.

• Smith, A., & Johnson, B. (2024). Towards a Unified Framework for Zero Trust and OAuth 2.1: Challenges and Solutions. Journal of Internet Services and Applications, 15(1), 1–17.

Downloads

Published

2025-03-05
CITATION
DOI: 10.36676/urr.v12.i1.1459
Published: 2025-03-05

How to Cite

Kassetty , N., & Kumar , D. L. (2025). ZERO-OAUTH: Enabling Zero Trust in API Security with Advanced OAuth Architectures. Universal Research Reports, 12(1), 22–35. https://doi.org/10.36676/urr.v12.i1.1459

Issue

Section

Original Research Article