Examining Cloud Computing's Data Security Problems and Solutions: Authentication and Access Control (AAC)

Authors

  • Karthikeyan Parthasarathy

Keywords:

Authentication, Access Control, Multi-factor Authentication,, Role-based Access Control (RBAC),, Attribute-based Access Control (ABAC),, Blockchain-based Access Control,, Machine Learning-driven Anomaly Detection.

Abstract

Cloud computing has transformed data and application management, providing
unprecedented flexibility and scalability. However, this move raises additional security concerns,
particularly in terms of authentication and access control (AAC). This research investigates data
security issues in cloud computing, with an emphasis on effective AAC strategies for reducing
security threats. We examine the state of AAC in cloud computing, including approaches such as
multi-factor authentication, role-based access control, and attribute-based access control. Data
security issues such as multi-tenancy, data transfer over the internet, and regulatory compliance
are investigated. AAC technological breakthroughs such as biometric identification, blockchain-
based access management, and machine learning-driven anomaly detection are examined in terms
of their ability to improve data security in cloud systems. Even if cloud computing is being adopted
at a rapid pace, there is still a large knowledge gap on suitable AAC solutions. In order to close
this gap, this work carefully analyzes AAC in cloud computing, identifies challenges, and suggests
innovative AAC techniques that enhance data security. Through a comprehensive analysis of
literature, case studies, and technology evaluation, we provide practical suggestions that
companies may implement to enhance their data security posture when using cloud computing. By
offering thorough analysis and useful advice for handling data security issues in cloud computing
environments, this study adds to the body of knowledge on cloud security in academia.

Downloads

Published

2022-12-22

How to Cite

Karthikeyan Parthasarathy. (2022). Examining Cloud Computing’s Data Security Problems and Solutions: Authentication and Access Control (AAC). Journal of Science & Technology (JST), 7(12), 35–48. Retrieved from https://jst.org.in/index.php/pub/article/view/1026