STUDY ON CLOUD-BASED IDENTITY AND ACCESS MANAGEMENT IN CYBER SECURITY

Authors

  • Kaushik Reddy Muppa Advisory Manager, Deloitte, Ashburn, VA, United States. Author

Keywords:

Identity And Access Management (IAM), Cyber Security, Cloud Computing

Abstract

Identity and access management (IAM) solutions have evolved throughout the years, with varying degrees of adoption and use. In many developing-world businesses, the usage of a username and password is still an IAM system. On the other hand, problems and consequences for businesses specific to this strategy have begun to surface. With its ease of use and strong security features, single sign-on (SSO) is quickly becoming one of the most popular identity and access management (IAM) systems for protecting cloud users from unauthorized access. Cloud computing has recently grown in popularity as a practical solution for individuals looking for a cheaper and more efficient way to store and run their data and applications. The construction of a data storage or application infrastructure out of a large collection of interconnected systems in a public or private network is what this paradigm in computer science is all about. Protecting data stored in the cloud has proven to be a formidable challenge for cloud service providers. Cloud service providers are protecting their infrastructure by using a variety of security management standards and techniques. However, hackers are using novel strategies and technological advancements to steal vital personal information, posing a severe risk to cloud security. Nowadays, hackers use sophisticated methods that are difficult to detect because of their ability to blend in with their surroundings. There are still security holes in cloud systems, but this research aims to fix them so that clients and servers can communicate freely without fear of eavesdroppers or channel listeners, and storage servers can resist attacks with more ease.

References

A. Bhutani, Identity and access management (IAM) market size by solution, Global Market Insights, Washington DC, 2018.

H. A. Dinesha and V. K. Agrawal, Multi-level authentication technique for accessing cloud services, International Conference on Computing, communication and applications, vol. 10, no. 1, pp. 1-4, 2018.

S. Shaulova, Global single sign-on market share, Veracious Statistics Research, New York, 2021.

A. A. Dahiru, J. M. Bass and I. K. Allison, Cloud computing adoption in sub-Saharan Africa: An analysis using institutions and capabilities, in Society 2014, Lancashire, 2016.

N. Galov, Cloud adoption statistics for 2021, Hosting Tribunal, Washington DC, 2021.

R. Carvalho, Cloud computing authentication security with diversity and redundancy, Instituto Superior Tecnico, Madrid, 2014.

Verified Market Research, Identity and access management market worth $29.29 billion, globally by 2027 at 13.21% CADR, Cision PR Newswire, New York, 2021.

C. Shinder, Idenity and access management in the cloud, Technet, New York, 2021.

Deloitte, Cloud and identity and access management, Deloitte, London, 2018.

S. Radoslav, 37 heavenly cloud computing statistics for 2021, Tech Jury, New York, 2021.

V. Beal, Identity and access management (IAM), Technology Advice, New York, 2021.

I. A. Mohammed, The interaction between artificial intelligence and identity and access management: An empirical study, International journal of creative research thoughts, vol. 3, no. 1, 2015.

G. Chen, Y. Du, P. Qin, L. Zhang and J. Du, A new single sign- on solution in cloud, Computer engineering and networking, vol. 277, pp. 755-761, 2013.

Nida, Pinki, H. Dhiman and S. Hussain, A survey on identity and access management in cloud computing, International journal of engineering research and technology, vol. 3, no. 4, 2014.

I. A. Mohammed, Analysis of identity and access management alternatives for a multinational information-sharing environment, International journal of advanced and innovative research, vol. 1, no. 8, 2012.

B. Lee, SSO is not identity management, Jump Cloud, New York, 2021.

Downloads

Published

2024-05-21

How to Cite

STUDY ON CLOUD-BASED IDENTITY AND ACCESS MANAGEMENT IN CYBER SECURITY. (2024). INTERNATIONAL JOURNAL OF DATA ANALYTICS RESEARCH AND DEVELOPMENT (IJDARD), 2(1), 40-49. https://iaeme-library.com/index.php/IJDARD/article/view/IJDARD_02_01_005