Cloud computing is radically changing the way businesses around the world manage their operations. In 2023 alone, 94% of businesses used it to streamline services, increase productivity, and protect valuable data.
However, even as organizations are empowered to achieve their goals, concerns remain about the security of the cloud-based environment, particularly the ability of malicious insiders or former employees to gain unauthorized access to sensitive data.
Research into deploying an integrated framework for authentication-based security and access control across cloud-based environments has led to a new approach to cloud security and sensitive data protection.
The research conducted by Dr. Satish Karuturi, an expert in computer engineering and cloud computing, aims to understand how a cloud-based system can operate more securely by implementing security levels that will prevent unauthorized access, ultimately preventing malicious insider attacks that could affect critical data.
It unveils a secure framework that uses encryption algorithms and digital signatures to provide enhanced end-to-end authentication as well as cloud security that includes access control and levels.
However, even as organizations are empowered to achieve their goals, concerns remain about the security of the cloud-based environment, particularly the ability of malicious insiders or former employees to gain unauthorized access to sensitive data.
Research into deploying an integrated framework for authentication-based security and access control across cloud-based environments has led to a new approach to cloud security and sensitive data protection.
The research conducted by Dr. Satish Karuturi, an expert in computer engineering and cloud computing, aims to understand how a cloud-based system can operate more securely by implementing security levels that will prevent unauthorized access, ultimately preventing malicious insider attacks that could affect critical data.
It unveils a secure framework that uses encryption algorithms and digital signatures to provide enhanced end-to-end authentication as well as cloud security that includes access control and levels.
“This cybersecurity approach reduces the risk of a ‘man in the middle’ or ‘dictionary’ attack and requires no additional software or hardware for authentication,” said Carutori. “It is the first layer-based security model designed to address all authentication challenges at once, sharing service access keys between cloud providers and customer service units, and managing it with an anonymous third party.”