Abstract:
In recent years, advancements in information technology have led to a significant transformation towards cloud computing environments. These environments enable users to access information seamlessly from virtually anywhere and at any time, utilizing a variety of devices such as smartphones, tablets, and laptops. This flexibility enhances productivity and collaboration; however, it also introduces complexities related to security and data management. As these computing environments rely heavily on wireless networks and an array of interconnected devices, the potential for security breaches increases. Reckless management of information resources—such as inadequate data protection measures or poorly defined access controls—can lead to significant vulnerabilities within the system. Therefore, effective management of access authority emerges as a critical issue, crucial for safeguarding both sensitive information and the integrity of the system itself. To address these challenges, it is imperative to establish a robust security policy that is adapted to the specific needs of the system. This policy should encompass mechanisms for user authentication, data encryption, and continuous monitoring of access activities to thwart unauthorized attempts to access resources. In this paper, we propose a comprehensive user authentication model that relies on detailed user profiles. This model is designed to enhance access control by employing active classification methods, inference techniques, and analytical judgment processes. By assessing users based on their profiles and behavior, the system can determine their eligibility for accessing various resources. This approach not only facilitates efficient and secure access but also helps in adapting to evolving security needs in a dynamic cloud environment.
Keywords:
Cloud Computing, Wireless Networks, Data Encryption, User Authentication Model
Citations:
APA:
Garza-Reyes, J. A. (2021). Enhancing User Authentication in Cloud Computing with Knowledge Base Configuration. Journal of Science and Engineering Management, 2(3), 11-22. https://doi.org/10.33832/jsem.2021.2.3.02