ANALYSIS ON THE ROLE OF ARTIFICIAL INTELLIGENCE AND IDENTITY AND ACCESS MANAGEMENT (IAM) IN CYBER SECURITY

Authors

  • Kaushik Reddy Muppa Advisory Manager, Deloitte, Ashburn, VA, United States. Author

Keywords:

Identity And Access Management (IAM), Artificial Intelligence, Information Technology (IT), Cyber-Security

Abstract

The major purpose of this article is to investigate how identity and access management systems are utilized in a variety of different sectors. When it comes to the protection of sensitive information, the IAM system often possesses a collection of functions that have been predetermined. In the context of identity and access management (IAM), authentication is an essential component since it can validate the identity of authorized service providers. With an eye toward IAM systems, this article aims to provide a summary of research on intelligent authentication. These research projects are evaluated using the essential criteria for intelligent authentication that have been suggested. The results of this investigation indicate that a fully functional authentication system cannot be created and implemented at this time. Users must have separate identities and permissions to access all applications, system software, database platforms, etc., to effectively manage today's complex IT environments. The investigation makes use of a mixed-methods approach, which combines qualitative and quantitative research approaches together. To understand the present and future of AI in IAM, we surveyed 582 cybersecurity experts and used multiple regression analysis to look at how different aspects affect system efficacy. Here we test four hypotheses: first, that the configuration of hardware and software affects system accuracy; second, that computational environments affect reliability; third, that demographic factors play a role in user acceptance; and fourth, that technological improvements affect system performance and acceptance. According to the results, there are strong relationships between these variables and AI's performance in IAM.

References

C. Gunter, D. Liebovitz and B. Malin, "Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems", IEEE Security & Privacy Magazine, vol. 9, no. 5, pp. 48-55, 2011.

M. Bezzi, M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen and K. Zhang, Privacy and Identity Management for Life. Berlin: Springer, 2010.

K. Bryson, M. Luck, M. Joy and D. Jones, "Agent interaction for bioinformatics data management", Applied Artificial Intelligence, vol. 15, no. 10, pp. 917-947, 2001. Available: 10.1080/088395101753242688.

D. Cole, "Artificial intelligence and personal identity", Synthese, vol. 88, no. 3, pp. 399-417, 1991. Available: 10.1007/bf00413555.

N. Sgouros, "Interaction between physical and design knowledge in design from physical principles", Engineering Applications of Artificial Intelligence, vol. 11, no. 4, pp. 449-459, 1998. Available: 10.1016/s0952-1976(98)00037-2.

Divyabharathi DN, Cholli NG. A review on identity and access management server (keycloak). Int J Secur Priv Pervasive Comput (IJSPPC). 2020;12(3):46–53.

Mohammed IA. The interaction between artificial intelligence and identity and access management: an empirical study. Int J creat Res Thoughts (IJCRT), ISSN. 2021;2320(2882):668–71.

Cameron A, Williamson G. Introduction to IAM Architecture (v2). IDPro Body of Knowledge. 2020;1(6). doi: 10.55621/idpro.38.

Carnley PR, Kettani H. Identity and access management for the internet of things. Int J Future Comput Commun. 2019;8(4):129–33.

Saranya N, Sakthivadivel M, Karthikeyan G, Rajkumar R. Securing the cloud: an empirical study on best practices for ensuring data privacy and protection. Int J Eng Manag Res. 2023;13(2):46–9.

Downloads

Published

2024-05-21

How to Cite

Kaushik Reddy Muppa. (2024). ANALYSIS ON THE ROLE OF ARTIFICIAL INTELLIGENCE AND IDENTITY AND ACCESS MANAGEMENT (IAM) IN CYBER SECURITY. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT (IJAIRD), 2(1), 113-122. https://iaeme-library.com/index.php/IJAIRD/article/view/IJAIRD_02_01_011