The Role of AI in Cloud-Based Identity and Access Management (IAM) for Enterprise Security

Authors

  • Kathiravan Thangavelu Microsoft Corp, USA Author
  • Lakshmi Durga Panguluri Finch AI, USA Author
  • Feroskhan Hasenkhan Truveta, USA Author

Keywords:

AI-driven IAM, cloud security, enterprise cybersecurity

Abstract

Artificial intelligence has turn out as an evolutionary force in cloud-based Identity and Access Management (IAM) which enhances security by improving authentication protocols, automating threat detection, and reinforcing zero-trust security models. As companies rapidly adapting cloud environment AI-based IAM provides dynamic access control, continuous authentication mechanisms, and sophisticated anomaly detection techniques that significantly reduces insider threats and unauthorised access. The objective of this study is to examine AI powered IAM implementation in high-risk industries based on Microsoft Azure Active Directory (Azure AD) and Amazon Web Services Identity and Access Management (AWS IAM).

Downloads

Download data is not yet available.

References

N. Alhadawi, R. G. Bellekens, and K. Kifayat, "Artificial intelligence-driven identity

and access management: A zero-trust approach," IEEE Access, vol. 10, pp.

–45247, 2022.

J. Kim and H. Lee, "AI-driven anomaly detection for identity and access management

in cloud computing," IEEE Transactions on Information Forensics and Security, vol.

, pp. 2017–2031, 2023.

Singu, Santosh Kumar. "Real-Time Data Integration: Tools, Techniques, and Best

Practices." ESP Journal of Engineering & Technology Advancements 1.1 (2021):

-172.

S. Kumari, "Agile Cloud Transformation in Enterprise Systems: Integrating AI for

Continuous Improvement, Risk Management, and Scalability", Australian Journal of

S. Kumari, "AI-Enhanced Agile Development for Digital Product Management:

Leveraging Data-Driven Insights for Iterative Improvement and Market Adaptation",

Adv. in Deep Learning Techniques, vol. 2, no. 1, pp. 49-68, Mar. 2022

Singu, Santosh Kumar. "Designing scalable data engineering pipelines using Azure

and Databricks." ESP Journal of Engineering & Technology Advancements 1.2

(2021): 176-187.

S. Kumari, "AI-Driven Cybersecurity in Agile Cloud Transformation: Leveraging

Machine Learning to Automate Threat Detection, Vulnerability Management, and

Incident Response", J. of Art. Int. Research, vol. 2, no. 1, pp. 286-305, Apr. 2022

X. Luo, P. Li, and J. Chen, "Quantum-resistant cryptography for AI-powered IAM

systems in cloud security," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp.

–312, Feb. 2024.

A. Shukla, V. Gupta, and S. Bose, "Zero-knowledge proofs for AI-powered

decentralized identity management," IEEE Transactions on Information Forensics

and Security, vol. 18, pp. 567–582, Jan. 2023.

Y. Wang and M. Patel, "AI-driven IAM for high-risk industries: Case studies in finance

and healthcare," IEEE Transactions on Industrial Informatics, vol. 19, no. 3, pp.

–1302, Mar. 2023.

H. Zhang, R. Sharma, and T. Nguyen, "Cloud-native IAM: AI-powered identity

governance and administration," IEEE Transactions on Services Computing, vol. 16,

no. 2, pp. 235–248, Feb. 2023.

P. Wang, K. Chen, and M. Sun, "AI-powered threat intelligence in IAM: A zero-trust

security perspective," IEEE Transactions on Network and Service Management, vol.

, no. 4, pp. 654–669, Dec. 2023.

F. R. Miller and T. K. Cho, "Adversarial AI in identity management: Emerging threats

and countermeasures," IEEE Transactions on Artificial Intelligence, vol. 5, no. 1, pp.

–89, Jan. 2024.

K. A. Farooq and L. D. Hansen, "Scalability challenges in AI-driven IAM solutions: A

multi-cloud approach," IEEE Transactions on Parallel and Distributed Systems, vol.

, no. 2, pp. 390–404, Feb. 2024.

A. S. Patel and M. J. Kim, "Neural networks for fraud detection in AI-powered identity

access management," IEEE Transactions on Neural Networks and Learning

Systems, vol. 34, no. 1, pp. 92–105, Jan. 2024.

S. Das, Y. Xie, and J. Y. Lin, "AI-driven IAM in hybrid cloud environments: A

blockchain-based approach," IEEE Transactions on Cloud Computing, vol. 12, no. 1,

pp. 121–136, Jan. 2024.

Downloads

Published

12-09-2022

How to Cite

[1]
Kathiravan Thangavelu, Lakshmi Durga Panguluri, and Feroskhan Hasenkhan, “The Role of AI in Cloud-Based Identity and Access Management (IAM) for Enterprise Security”, Los Angeles J Intell Syst Pattern Rec, vol. 2, pp. 36–72, Sep. 2022, Accessed: Mar. 07, 2026. [Online]. Available: https://lajispr.org/index.php/publication/article/view/15