Examining Cloud Computing's Data Security Problems and Solutions: Authentication and Access Control (AAC)

Authors

  • Karthikeyan Parthasarathy

Keywords:

Authentication, Access Control, Multi-factor Authentication, Role-based Access Control (RBAC), Attribute-based Access Control (ABAC), Blockchain-based Access Control, Machine Learning-driven Anomaly Detection

Abstract

Cloud computing has transformed data and application management, providing unprecedented flexibility and scalability. However, this move raises additional security concerns, particularly in terms of authentication and access control (AAC). This research investigates data security issues in cloud computing, with an emphasis on effective AAC strategies for reducing security threats. We examine the state of AAC in cloud computing, including approaches such as multi-factor authentication, role-based access control, and attribute-based access control. Data security issues such as multi-tenancy, data transfer over the internet, and regulatory compliance are investigated. AAC technological breakthroughs such as biometric identification, blockchain-based access management, and machine learning-driven anomaly detection are examined in terms of their ability to improve data security in cloud systems. Even if cloud computing is being adopted at a rapid pace, there is still a large knowledge gap on suitable AAC solutions. In order to close this gap, this work carefully analyzes AAC in cloud computing, identifies challenges, and suggests innovative AAC techniques that enhance data security. Through a comprehensive analysis of literature, case studies, and technology evaluation, we provide practical suggestions that companies may implement to enhance their data security posture when using cloud computing. By offering thorough analysis and useful advice for handling data security issues in cloud computing environments, this study adds to the body of knowledge on cloud security in academia.

Downloads

Published

2022-12-09

How to Cite

Karthikeyan Parthasarathy. (2022). Examining Cloud Computing’s Data Security Problems and Solutions: Authentication and Access Control (AAC). Journal of Science & Technology (JST), 7(10), 149–162. Retrieved from https://jst.org.in/index.php/pub/article/view/984

Similar Articles

<< < 35 36 37 38 39 40 41 42 43 44 > >> 

You may also start an advanced similarity search for this article.