International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 28 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Management | India | Volume 10 Issue 11, November 2021


Cloud Identity Mastery: Overcoming Access Management Challenges in the Digital Ether

Shanmugavelan Ramakrishnan [6]


Abstract: Identity and Access Management (IAM) in cloud environments is the focus of this in - depth analysis of AI's efficacy and integration. Addressing the opportunities and threats in cloud computing, it mainly focuses on how AI may improve user authentication, authorization, and access control. Utilising quantitative and qualitative analysis, the study takes a mixed - methods approach. Using multiple regression analysis, we look at how different aspects affect system efficacy, and a survey of 582 cybersecurity experts sheds light on where AI is today and where it could go in IAM. Here we test four hypotheses: first, that the configuration of hardware and software affects system accuracy; second, that computational environments affect reliability; third, that demographic factors play a role in user acceptance; and fourth, that technological improvements affect system performance and acceptance. The results show that these criteria are significantly correlated with AI's efficacy in IAM. System accuracy is affected by hardware configurations and security concerns; system reliability is affected by variations in the computational environment; user acceptance is affected by demographic factors; and improvements in performance and acceptance are brought about by enhancements such as user feedback, advances in artificial intelligence, continuous learning algorithms, and system transparency. For IAM to work in cloud settings, these findings highlight the importance of standardised software, user - centric design, cutting - edge hardware, and ongoing advancements in AI. Involving users in development processes, maintaining openness, and using adaptive algorithms are the three most important recommendations that the study offers to developers and cloud service providers.


Keywords: Identity and Access Management (IAM), artificial intelligence (AI), Access management, Cloud


Edition: Volume 10 Issue 11, November 2021,


Pages: 1506 - 1515


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top