Downloads: 2 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article | Information Technology | India | Volume 12 Issue 12, December 2023 | Popularity: 5 / 10
Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Abstract: Conventionally, organizations have used Privileged Access Management (PAM) techniques to secure, control, and monitor access to their critical information and resources. The PAM concepts have envisioned designing protocols that help protect user accounts that are deemed to have access to sensitive data ?the most valuable asset of a business. While in the past these techniques have proven vital to data protection and security, the onset of increasingly sophisticated technologies and more determined malicious actors warrants a change of data control and privacy strategies. It becomes impossible to secure a system to achieve 100 percent efficiency. Any system that is attached to the internet is vulnerable to cyberattacks. Hackers have numerous ways to compromise systems if traditional boundary security mechanisms are deployed. Detecting an intrusion in such a setup becomes increasingly challenging if an attacker successfully breaches that boundary layer of defense. Since traditional authentication and authorization might not be reliable in network systems, the zero - knowledge proof model comes in handy. Adding the zero - knowledge proof to the PAM to authenticate users or members and disclose or anonymize them through decentralized identifiers helps in solving the identification and privacy protection problem. We propose a PAM and zero - knowledge proof - inspired approach to address the authentication, data security, and privacy concerns. A zero - knowledge proof is a method that allows the prover to prove to the verifier that they know a certain information without disclosing it.
Keywords: Cyber attacks, data breaches, data protection, privileged access management, zero knowledge
Edition: Volume 12 Issue 12, December 2023
Pages: 2114 - 2119
DOI: https://www.doi.org/10.21275/SR24615144125
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 2, February 2020
Pages: 1953 - 1959Data Analytics: Data Privacy, Data Ethics, Data Monetization
Kishore Gade
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022
Pages: 1549 - 1559Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments
Yash Jani, Arth Jani, Dhaval Gogri
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 10 Issue 2, February 2021
Pages: 1766 - 1769Data Protection in Collaboration: Safeguarding Sensitive Information with Third-Party Stakeholders
Rajendraprasad Chittimalla
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, United States of America, Volume 13 Issue 10, October 2024
Pages: 437 - 441Leveraging Dimensional Modeling for Optimized Healthcare Data Warehouse Cloud Migration: Data Masking and Tokenization
Jaishankar Inukonda
Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9
Review Papers, Information Technology, United States of America, Volume 13 Issue 8, August 2024
Pages: 394 - 398Securing Justice: Enhancing Cybersecurity in the Criminal Justice System
Deepthi Kallahakalu Vijay Dev