Zero-Trust Architecture for Decentralized Edge Computing: Principles of Data Sovereignty and Regulatory Compliance

Myroslav Mishov

Citation: Myroslav Mishov, "Zero-Trust Architecture for Decentralized Edge Computing: Principles of Data Sovereignty and Regulatory Compliance", Universal Library of Innovative Research and Studies, Volume 03, Issue 02.

Copyright: This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

This article analyzes contemporary approaches to building Zero-Trust architectures for decentralized edge computing under conditions of increasing requirements for digital sovereignty, localized data processing, and regulatory compliance. The study is conducted as a systematic review and analytical synthesis of publications focused on Zero Trust Architecture, decentralized edge computing, data sovereignty, federated learning, Self-Sovereign Identity, Compliance-as-Code, and distributed trust verification. Particular attention is given to the relationship between localized data processing, continuous trust verification, decentralized identity management, telemetry analysis, and adaptive policy enforcement. The study identifies the main limitations of centralized cloud-dependent security models, including policy propagation delays, dependence on external trust services, risks of cross-border data transfer, and inconsistencies between infrastructure behavior and regulatory control mechanisms. It is substantiated that static Zero-Trust models cannot ensure resilient management of distributed edge environments without continuous correlation between telemetry, node states, service behavior, access policies, and compliance parameters. Within the framework of the study, an original model entitled Sovereignty-Aware Zero-Trust Architecture for Decentralized Edge Computing is proposed, in which Zero Trust is interpreted as a mechanism for continuous governance of sovereignty, security, and regulatory compliance in distributed infrastructures. The article may be useful for researchers, cybersecurity specialists, developers of edge infrastructures, and organizations implementing sovereign computing and compliance management systems.


Keywords: Distributed Edge Computing, Digital Sovereignty, Continuous Trust Verification, Decentralized Identity, Federated Learning, Adaptive Policy Orchestration, Regulatory Compliance.

Download doi https://doi.org/10.70315/uloap.ulirs.2026.0302009