International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Information Technology | India | Volume 12 Issue 12, December 2023 | Popularity: 5 / 10


     

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru


Abstract: Conventionally, organizations have used Privileged Access Management (PAM) techniques to secure, control, and monitor access to their critical information and resources. The PAM concepts have envisioned designing protocols that help protect user accounts that are deemed to have access to sensitive data ?the most valuable asset of a business. While in the past these techniques have proven vital to data protection and security, the onset of increasingly sophisticated technologies and more determined malicious actors warrants a change of data control and privacy strategies. It becomes impossible to secure a system to achieve 100 percent efficiency. Any system that is attached to the internet is vulnerable to cyberattacks. Hackers have numerous ways to compromise systems if traditional boundary security mechanisms are deployed. Detecting an intrusion in such a setup becomes increasingly challenging if an attacker successfully breaches that boundary layer of defense. Since traditional authentication and authorization might not be reliable in network systems, the zero - knowledge proof model comes in handy. Adding the zero - knowledge proof to the PAM to authenticate users or members and disclose or anonymize them through decentralized identifiers helps in solving the identification and privacy protection problem. We propose a PAM and zero - knowledge proof - inspired approach to address the authentication, data security, and privacy concerns. A zero - knowledge proof is a method that allows the prover to prove to the verifier that they know a certain information without disclosing it.


Keywords: Cyber attacks, data breaches, data protection, privileged access management, zero knowledge


Edition: Volume 12 Issue 12, December 2023


Pages: 2114 - 2119


DOI: https://www.doi.org/10.21275/SR24615144125



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sri Kanth Mandru, "Zero Knowledge Proof Techniques in PAM Authentication", International Journal of Science and Research (IJSR), Volume 12 Issue 12, December 2023, pp. 2114-2119, https://www.ijsr.net/getabstract.php?paperid=SR24615144125, DOI: https://www.doi.org/10.21275/SR24615144125



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 2, February 2020

Pages: 1953 - 1959

Data Analytics: Data Privacy, Data Ethics, Data Monetization

Kishore Gade

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022

Pages: 1549 - 1559

Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments

Yash Jani, Arth Jani, Dhaval Gogri

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 10 Issue 2, February 2021

Pages: 1766 - 1769

Data Protection in Collaboration: Safeguarding Sensitive Information with Third-Party Stakeholders

Rajendraprasad Chittimalla

Share this Article

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, United States of America, Volume 13 Issue 10, October 2024

Pages: 437 - 441

Leveraging Dimensional Modeling for Optimized Healthcare Data Warehouse Cloud Migration: Data Masking and Tokenization

Jaishankar Inukonda

Share this Article

Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Review Papers, Information Technology, United States of America, Volume 13 Issue 8, August 2024

Pages: 394 - 398

Securing Justice: Enhancing Cybersecurity in the Criminal Justice System

Deepthi Kallahakalu Vijay Dev

Share this Article
Top