Identity and Access Management in the Cloud
DOI:
https://doi.org/10.32628/CSEIT25112523Keywords:
Identity and Access Management (IAM), Cloud Security, Single Sign-On (SSO), Multi-Factor Authentication (MFA), Federated Identity Management, Access Control, Cloud ComputingAbstract
Cloud computing has revolutionized the way businesses and organizations operate, enabling scalable, flexible, and cost-effective IT infrastructures. However, as the reliance on cloud services grows, so do the challenges related to securing sensitive data and systems. Identity and Access Management (IAM) plays a crucial role in ensuring that only authorized users can access cloud resources. This paper explores the fundamental concepts of IAM in the cloud, focusing on its components, authentication mechanisms, and authorization processes. It discusses how IAM systems are structured, the various mechanisms used to authenticate users, and how access
Downloads
References
Berman, S. J., & Milkovich, G. T. (2022). Identity and Access Management in the Cloud. Journal of Cloud Computing Security, 15(4), 220-245.
Cohen, A., & Nguyen, V. (2021). Authentication and Authorization in Cloud Computing. Cloud Security and Privacy Journal, 12(3), 150-165.
Johnson, K., & Smith, L. (2020). Best Practices for IAM in the Cloud. International Journal of Information Security, 28(1), 112-130.
Turner, M., & Vickers, A. (2023). The Role of Multi-Factor Authentication in Cloud Security. Cybersecurity Review, 9(2), 80-95.
Chen, L., & Zhang, X. (2022). Managing IAM in Multi-Cloud Environments: Best Practices and Challenges. International Journal of Cloud Computing, 15(4), 112-127.
Patel, R., & Gupta, S. (2021). Interoperability and Security Protocols in Multi-Cloud IAM Solutions. Journal of Cloud Security and Compliance, 8(2), 44-59.
Williams, D., & Thompson, A. (2023). Achieving Consistent Policy Management Across Multi-Cloud Platforms. Cloud Computing Journal, 9(1), 78-91.
Johnson, L., & Hines, M. (2020). Monitoring and Auditing IAM Systems in a Multi-Cloud Environment. Cybersecurity Review, 12(5), 102-118.
Taylor, J., & Miller, P. (2021). Compliance and Governance in Cloud Identity and Access Management Systems. Journal of Information Security, 14(3), 145-161.
Doe, J., & Kumar, R. (2023). Zero Trust Architecture in IAM Systems: A New Paradigm for Securing Digital Identities. Cybersecurity Trends, 18(2), 34-45.
Miller, D., & Zhang, L. (2022). Decentralized Identity: Blockchain as the Future of Secure Access Management. International Journal of Cloud Security, 20(3), 125-140.
Patel, S., & Singh, R. (2023). Artificial Intelligence in Identity and Access Management: Advancements and Opportunities. Journal of Cybersecurity, 9(4), 189-200.
Harrison, M., & Walker, K. (2021). Identity Governance and Administration 2.0: The Next Evolution in Cloud Security. IAM Solutions Review, 16(1), 22-37.
Brown, T., & Lewis, P. (2022). The Rise of Identity-as-a-Service (IDaaS): Simplifying Cloud Security for the Modern Enterprise. Cloud Security Journal, 7(2), 56-67.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.