Research Article

Data-Centric Zero-Trust Architecture for Edge AI Systems

Authors

  • Pratik G Koshiya Independent Researcher, USA

Abstract

Unparalleled safety troubles as a result of the explosive boom of aspect synthetic intelligence structures can not be properly dealt with through traditional perimeter-based protection paradigms. Modern TinyML deployments in IoT scenarios run under stringent resource limitations while handling confidential information on geographically dispersed, physically vulnerable devices. The inherent incompatibility between Zero-Trust security needs and limitations of edge computing calls for novel architectural approaches. A new data-centric Zero-Trust architecture overcomes these difficulties using risk-adaptive security controls that manipulate protection mechanisms dynamically as a function of data sensitivity and business value. The architecture realizes four pillars of foundation: exhaustive data-flow sensitivity classification, dynamic policy enforcement using declarative languages, verifiable integrity using hardware-rooted attestation, and granular network flow control using micro-segmentation. Implementation makes use of lightweight Kubernetes distributions, service mesh technology, and industry-standard hardware attestation modules to develop interoperable solutions. Performance measurement illustrates workable overhead with request latency growth proportional to policy complexity and retains sub-millisecond response time for regular operations. The design effectively neutralizes threats ranging from physical tampering, network attacks, to AI-vulnerable-based attacks through inseparable defense measures. Realistic deployment use cases confirm efficacy across various edge AI use cases, with scalability ensured by distributed policy engines and smart load balancing.

Article information

Journal

Journal of Computer Science and Technology Studies

Volume (Issue)

7 (10)

Pages

56-66

Published

2025-09-28

How to Cite

Pratik G Koshiya. (2025). Data-Centric Zero-Trust Architecture for Edge AI Systems. Journal of Computer Science and Technology Studies, 7(10), 56-66. https://doi.org/10.32996/jcsts.2025.7.10.6

Downloads

Views

0

Downloads

0

Keywords:

Edge Artificial Intelligence, Zero-Trust Architecture, Data-Centric Security, Hardware Attestation, Micro-Segmentation, Policy Enforcement