Article contents
The Future of Identity and Access Management: Leveraging AI for Enhanced Security and Efficiency
Abstract
As organizations face increasingly complex security challenges, the integration of Artificial Intelligence (AI) in Identity and Access Management (IAM) systems has emerged as a transformative solution. This paper explores the multifaceted role of AI in enhancing IAM systems, focusing on key capabilities such as anomaly detection, continuous improvement, scalability, regulatory compliance, and access management processes. AI-driven systems enhance security by enabling real-time anomaly detection, adaptive learning, and automated responses to evolving threats. They improve scalability and performance, ensuring IAM systems can handle the growing demands of large, dynamic environments. Additionally, AI facilitates regulatory compliance by providing robust audit trails and enhancing the approval processes for access management. However, the adoption of AI in IAM systems also presents significant challenges, including data privacy concerns, integration with legacy systems, and potential biases in AI models. The paper concludes by outlining future research directions, emphasizing the need for explainable, ethical, and adaptable AI solutions. Overall, AI-driven IAM systems offer promising advancements in securing digital infrastructures, improving operational efficiency, and fostering regulatory compliance, while also presenting new avenues for innovation and research.
Article information
Journal
Journal of Computer Science and Technology Studies
Volume (Issue)
6 (3)
Pages
136-154
Published
Copyright
Open access

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] Waltersmann, L.; Kiemel, S.; Stuhlsatz, J.; Sauer, A.; Miehe, R. Artificial Intelligence Applications for Increasing Resource Efficiency in Manufacturing Companies—A Comprehensive Review. Sustainability 2021, 13, 6689.
[2] Singh, C.; Thakkar, R.G.; Warraich, J. IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations. Eur. J. Eng. Technol. Res. 2023, 8, 30–38.
[3] Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198.
[4] Campero-Jurado, I.; Sánchez, S.M.; Gomez, J.; Rodríguez, S.; Corchado, J. Smart Helmet 5.0 for Industrial Internet of Things Using Artificial Intelligence. Sensors 2020, 20, 6241.
[5] Pournader, M.; Ghaderi, H.; Hassanzadegan, A.; Fahimnia, B. Artificial intelligence applications in supply chain management. Int. J. Prod. Econ. 2021, 241, 108250.
[6] Amin, F.M.; Rezayati, M.; Venn, H.W.V.D.; Karimpour, H. A Mixed-Perception Approach for Safe Human-Robot Collaboration in Industrial Automation. Sensors 2020, 20, 6347.
[7] Peres, R.S.; Jia, X.; Lee, J.; Sun, K.; Colombo, A.; Barata, J. Industrial Artificial Intelligence in Industry 4.0 - Systematic Review, Challenges and Outlook. IEEE Access 2020, 8, 220121–220139.
[8] Alam, M.N.; Kabir, M.S.; Sumi, E.J. Artificial Intelligence (AI) and Future Immigration and Border Control. Int. J. Multidiscip. Res. 2023, 5, 1–7.
[9] Alomari, M.; Khan, H.U.; Khan, S.; Al-Maadid, A.; Abu-Shawish, Z.K.; Hammami, H. Systematic Analysis of Artificial Intelligence-Based Platforms for Identifying Governance and Access Control. Secur. Commun. Netw. 2021, 2021, 8686469.
[10] Fang, J.; Yan, C.; Yan, C. Centralized identity authentication research based on management application platform. In Proceedings of the 2009 First International Conference on Information Science and Engineering, IEEE, Washington, DC, USA, 26–28 December 2009; pp. 2292–2295.
[11] Rashid, A.; Masood, A.; Khan, A.u.R. RC-AAM: Blockchain-enabled decentralized role-centric authentication and access management for distributed organizations. Clust. Comput. 2021, 24, 3551–3571.
[12] Wang, S.; Yang, Y.; Xia, T.; Zhang, W. A role and node based access control model for industrial control network. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, Guiyang, China, 16–19 March 2018; pp. 89–94.
[13] Gowdanakatte, S.; Ray, I.; Hilde Houmb, S. Attribute based access control model for protecting programmable logic controllers. In Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Washington, DC, USA, 27 April 2022; pp. 47–56.
[14] Yu, L.; Zhu, S. Industry 4.0 Engineering Product Life Cycle Management Based on Multigranularity Access Control Model. Comput. Intell. Neurosci. 2022, 2022, 3655621.
[15] Oh, S.; Park, S. Task–role-based access control model. Inf. Syst. 2003, 28, 533–562
[16] Sladić, G.; Milosavljević, B.; Konjović, Z. Modeling context for access control systems. In Proceedings of the 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics, IEEE, Subotica, Serbia, 20–22 September 2012; pp. 37–42
[17] Johnson, F.M.P.D. Robust Identity and Access Management for Cloud Systems; Concordia University of Edmonton: Edmonton, AB, Canada, 2020.
[18] Kazdagli, M.; Tiwari, M.; Kumar, A. Using constraint programming and graph representation learning for generating interpretable cloud security policies. arXiv 2022.
[19] Burke, Q.; Mehmeti, F.; George, R.; Ostrowski, K.; Jaeger, T.; La Porta, T.F.; McDaniel, P. Enforcing multilevel security policies in unstable networks. IEEE Trans. Netw. Serv. Manag. 2022, 19, 2349–2365.
[20] Indu, I.; Anand, P.R.; Bhaskar, V. Identity and access management in cloud environment: Mechanisms and challenges. Eng. Sci. Technol. Int. J. 2018, 21, 574–588.
[21] Ots, K. Identity and Access Management. In Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment; Apress: Berkeley, CA, USA, 2021; pp. 11–38.
[22] Kunz, M.; Puchta, A.; Groll, S.; Fuchs, L.; Pernul, G. Attribute quality management for dynamic identity and access management. J. Inf. Secur. Appl. 2019, 44, 64–79.
[23] Schell, F.; Dinger, J.; Hartenstein, H. Performance evaluation of identity and access management systems in federated environments. In Proceedings of the Scalable Information Systems: 4th International ICST Conference, INFOSCALE 2009, Hong Kong, 10–11 June 2009; Revised Selected Papers 4; Springer: Berlin/Heidelberg, Germany, 2009; pp. 90–107.
[24] Puchta, A.; Groll, S.; Pernul, G. Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. In Proceedings of the ICISSP, Virtual, 11–13 February 2021; pp. 611–618.
[25] Anand, D.; Khemchandani, V. Identity and access management systems. In Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms and Solutions; IET—Institution of Engineering and Technology: London, UK, 2019; p. 61.
[26] Jain, A.K.; Kumar, A. Biometric recognition: An overview. In Second Generation Biometrics: The Ethical, Legal and Social Context; Springer: Berlin/Heidelberg, Germany, 2012; pp. 49–79.
[27] Sundararajan, K.; Woodard, D. Deep Learning for Biometrics: A survey. ACM Comput. Surv. (CSUR) 2018, 51, 1–34.
[28] Cui, F.; Yue, Y.; Zhang, Y.; Zhang, Z.; Zhou, H.S. Advancing Biosensors with Machine Learning. ACS Sensors 2020, 5, 3346–3364.
[29] Heinsohn, D.; Villalobos, E.; Prieto, L.; Mery, D. Face recognition in low-quality images using adaptive sparse representations. Image Vis. Comput. 2019, 85, 46–58.
[30] Alay, N.; Alagöz, F.; Dede, O.; Çolak, İ. Modern Biometrics: A review of biometric systems. Comput. Sci. Eng. 2014, 16, 62–74.
[31] García, F.; López, I.; Sánchez, A.; Carmona, S.; Medrano, C.; Ortega, M. An overview of identity and access management models and technologies. In Proceedings of the 2013 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 24–26 March 2014; IEEE: New York, NY, USA, 2014; pp. 1125–1130.