Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview
Author(s): MUPPA, Kaushik Reddy
Author(s) keywords: Artificial Intelligence, Biometric Authentication, cybersecurity, Identity and Access Management, Machine Learning
Reference keywords: access management, artificial intelligence, IAM systems
Abstract:
The article aims to impart an overview of integrating artificial intelligence (AI) with identity and access management (IAM) systems and their strategic view regarding evolution, benefits, and challenges. Solid IAM systems are bulwarks of defense that shield sensitive information from sophisticated digital threats. The evolution of IAM during these last three decades - from modules such as Lightweight Directory Access Protocol (LDAP) to developed systems - has made inroads into handling the contemporary complexities of modern security protocols. It is AI that boosts IAM to real-time threat detection, automated user provisioning, and compliance with regulations through which provisioning is done using machine learning to analyze vast amounts of data for the detection of access patterns that are not usual and from those to predict the breaches, followed by the implementation of solid authentications and controls, including biometric and adaptive verification. Apart from providing benefits, there are challenges to be taken care of in a scenario where the integration of AI will call for advanced hardware, standardized software, and intensive training of users. General AI-driven platforms and tools, like IBM Security Identity Governance and Microsoft Azure Active Directory, add to the strength of IAM by ensuring the automatic detection of potential threats and facilitating proactive actions against them. Moreover, the article elaborates on a few AI-driven IAM applications in the finance and healthcare sectors, which considerably impact data security and fraud reduction. In this regard, addressing the current challenges and developing standardized frameworks is going to be imperative for the extraction of the full potential of AI into IAM.
References:
[1]. K. R. Muppa, "Analysis on Cyber Risk Exposures and An Evaluation of The Elements That Go into Being Ready to Deal with Cyber Threats," International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 3, pp. 12-20, 2024.
[2]. K. R. Muppa, “Study on Cloud-Based Identity and Access Management in Cyber Security,” International Journal of Data Analytics Research and Development (IJDARD), vol. 2, no. 1, pp. 40-49, 2024.
[3]. C. Walker, "Identity and Access Management Evolution," Security Intelligence, 5 March 2024. [Online]. Available: https://securityintelligence.com/posts/identity-and-access-management-evolution/. [Accessed 24 May 2024].
[4]. S. O. Olabanji, O. O. Olaniyi, C. S. Adigwe, O. J. Okunleye, and T. O. Oladoyinbo, "AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems," SSRN, Jan. 25, 2024.
[5]. I. Azhar, "The interaction between artificial intelligence and identity & access management: An empirical study," International Journal of Creative Research Thoughts (IJCRT), 2015, pp. 2320-2882.
[6]. P. Bai, S. Kumar, G. Aggarwal, M. Mahmud, O. Kaiwartya, and J. Lloret, "Self-sovereignty identity management model for smart healthcare system," Sensors, vol. 22, no. 13, p. 4714, 2022.
[7]. I. A. Mohammed, "The interaction between artificial intelligence and identity and access management: an empirical study," International Journal of Creative Research Thoughts (IJCRT), vol. 2320, no. 2882, pp. 668-671, 2021.
[8]. R. Kumar, A. Arjunaditya, D. Singh, K. Srinivasan, and Y. C. Hu, "AI-powered blockchain technology for public health: A contemporary review, open challenges, and future research directions," in Healthcare, vol. 11, no. 1, p. 81, Dec. 2022.
[9]. S. Mulla, "A literature review on the tools for Identity Access Management using AI," Journal of Emerging Technologies and Innovative REsearch (JETIR), vol. 9, no. 10, p. 37, 2021.
[10]. B. Christ, "Navigating the Complexities of AI Identity Governance," Bravura Security, 24 January 2024. [Online]. Available: https://www.bravurasecurity.com/blog/navigating-the-complexities-of-ai-identity-governance. [Accessed 24 May 2024].
[11]. G. Liewer, "Leveraging AI I & Machine Learning in Identity Security," Saviynt, 2 February 2023. [Online]. Available: https://saviynt.com/blog/leveraging-ai-machine-learning-in-identity-security. [Accessed 24 May 2024].
[12]. K. R. Muppa, "Analysis on the Role of Artificial Intelligence and Identity and Access Management (IAM) In Cyber Security," International Journal of Artificial Intelligence Research and Development (IJAIRD), vol. 2, no. 1, pp. 113-122, 2024.
[13]. J. R. J, A. M. P and D. A. V. Biju, "BLURRED LINES: HOW ARTIFICIAL INTELLIGENCE IS RESHAPING THE FINANCIAL SECTOR," International Journal of Electrical Engineering and Technology (IJEET), vol. 11, no. 10, pp. 20-27, 2020.
[14]. N. J. Dewasiri, K. S. S. N. Karunarathne, S. Menon, P. G. S. A. Jayarathne, and M. S. H. Rathnasiri, "Fusion of Artificial Intelligence and Blockchain in the Banking Industry: Current Application, Adoption, and Future Challenges," in Transformation for Sustainable Business and Management Practices: Exploring the Spectrum of Industry 5.0, Emerald Publishing Limited, 2023, pp. 293-307.
[15]. R. Ahmad and S. Pande, "Examining the Integration of Artificial Intelligence in Customer Relationship Management," SSRN, 2024.
[16]. R. Shinde, S. Patil, K. Kotecha, V. Potdar, G. Selvachandran, and A. Abraham, "Securing AI‐based healthcare systems using blockchain technology: A state‐of‐the‐art systematic literature review and future research directions," Transactions on Emerging Telecommunications Technologies, vol. 35, no. 1, p. e4884, 2024.
[17]. “Making healthcare personal: An Overview of CGI's healthcare consulting services," [Online]. Available: http://ww.cgi.com. [Accessed 24 May 2024].
[18]. “AI IN HEALTH: HUGE POTENTIAL, HUGE RISKS," [Online]. Available: http://ww.oecd.com. [Accessed 24 May 2024].
Article Title: Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview
Author(s): MUPPA, Kaushik Reddy
Date of Publication: 2024-12-30
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2024.02.01
Issue: Volume 13, Issue 2, Year 2024
Section: Advances in Information Security Research
Page Range: 9-17 (9 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.