perpus@umsida.ac.id +62-31-8945444

Lamia, Akter and Dr. Muhammad Mainuddin, Mollah and Nusrat Jahan, Sany and Sagor, Ahamed (2022) Zero-Trust Access Control Systems by Artificial intelligence in Hybrid Cloud Environments. BEST JOURNAL OF INNOVATION IN SCIENCE, RESEARCH AND DEVELOPMENT, 1 (3). pp. 45-69. ISSN 2835-3579

[img] Text
45-69+Zero-Trust+Access+Control+Systems+by+Artificial+intelligence+in+Hybrid+Cloud+Environments.pdf

Download (847kB)
Official URL: https://www.bjisrd.com/index.php/bjisrd/article/vi...

Abstract

As cybersecurity attacks get more advanced and are delivered from more distant sources, perimeter-based security is not enough for hybrid cloud environments. Because of the increasing complexity and sharing of IT systems, traditional controls placed at a company’s edges do not work well in hybrid cloud setups. As a result, Zero-Trust Access Control Systems (ZTACS) have become a key solution, working by assuming nothing and always verifying identity. This work studies how to use AI in Zero Trust frameworks to make access control, detect abnormalities, and ensure policies are properly enforced in the ever-changing cloud environment. The Hornet 40: The research uses the Network Dataset of Geographically Placed Honeypots as its main evidence and data. In this dataset, information collected using 40 honeypots scattered around the world is used to spot malicious behavior and attempts at unauthorized access. Using the dataset, Random Forest, Isolation Forest, and Autoencoders help model patterns of behavior, find anomalies, and determine how risky user access is in real time. The analysis reveals that using AI with ZTACS helps to spot unusual access behaviors more quickly and with fewer false alarms than other approaches. Using dynamic trust scoring and behavior-based authentication leads to improved accuracy in making access choices that do not slow down operations in a hybrid cloud environment. It also points out some major challenges when using AI for security, including unbalanced sets of threats, difficulties in understanding how models work, and ensuring that data is protected. This work provides information on the technical benefits of AI-driven Zero Trust systems in facing cyber threats in distributed environments. These findings encourage developing access control systems that are automated, scalable, and use artificial intelligence to meet the needs of current cloud security. Uniting Zero Trust principles with AI could be the future of company cybersecurity.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Postgraduate > Master's of Islamic Education
Depositing User: Journal Editor
Date Deposited: 26 Jun 2025 12:33
Last Modified: 26 Jun 2025 12:33
URI: http://eprints.umsida.ac.id/id/eprint/16223

Actions (login required)

View Item View Item