AI Driven Identity Intelligence for Enterprise IAM: Predictive Risk Analytics and Automated Governance in Financial Cloud Environments

Authors

  • Raja Mohan Dhanushkodi Assistant Vice President, USA Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0801013

Keywords:

Artificial Intelligence, IAM, Predictive Risk Analytics, Anomaly Detection, Cloud Security, Behavioral Analysis

Abstract

The paper suggests an AI-based Identity Intelligence architecture of an enterprise IAM in financial clouds. The system is a combination of behavioral analysis, risk scoring, anomaly detection, and automated governance to enhance identity security. The experimental results demonstrate a huge performance improvement compared to traditional IAM systems, with an increase in detection accuracy (78% to 94%), precision (75% to 92%) and recall (70% to 93%). The rate of false positives drops from 18% to 6% and the response time decreases from 2.8s to 0.9s. It also improves automation with 89% access review automation and 95% efficiency in compliance as well as proactive and adaptive identity governance

References

[1] S. Aboukadri, A. Ouaddah, and A. Mezrioui, “Machine learning in identity and access management systems: Survey and deep dive,” Computers & Security, vol. 139, p. 103729, Jan. 2024, doi: 10.1016/j.cose.2024.103729.

[2] M. Naghmouchi, H. Kaffel, and M. Laurent, “An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts,” arXiv (Cornell University), Jan. 2022, doi: 10.48550/arxiv.2201.00231.

[3] S. Vitla, “The Future of Identity and Access Management: Leveraging AI for enhanced security and efficiency,” Journal of Computer Science and Technology Studies, vol. 6, no. 3, pp. 136–154, Aug. 2024, doi: 10.32996/jcsts.2024.6.3.12.

[4] F.-J. González-Serrano, A. Amor-Martín, and J. Casamayón-Antón, “Supervised machine learning using encrypted training data,” International Journal of Information Security, vol. 17, no. 4, pp. 365–377, Jun. 2017, doi: 10.1007/s10207-017-0381-1.

[5] R. Santos et al., “Crowdsourcing-Based fingerprinting for indoor location in Multi-Storey buildings,” IEEE Access, vol. 9, pp. 31143–31160, Jan. 2021, doi: 10.1109/access.2021.3060123.

[6] S. O. Olabanji, O. O. Olaniyi, C. S. Adigwe, O. J. Okunleye, and T. O. Oladoyinbo, “AI for Identity and Access Management (IAM) in the Cloud: Exploring the Potential of Artificial Intelligence to Improve User Authentication, Authorization, and Access Control within Cloud-Based Systems,” SSRN Electronic Journal, Jan. 2024, doi: 10.2139/ssrn.4706726.

[7] A. Gouglidis, A. Kagia, and V. C. Hu, “Model Checking Access Control Policies: A Case Study using Google Cloud IAM,” arXiv.org, Mar. 29, 2023. https://arxiv.org/abs/2303.16688

[8] C. Singh, R. Thakkar, and J. Warraich, “IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations,” European Journal of Engineering and Technology Research, vol. 8, no. 4, pp. 30–38, Aug. 2023, doi: 10.24018/ejeng.2023.8.4.3074.

[9] Y. Hu and W. Wang, “TAC: Hybrid IAM Privilege Escalation Detection,” arXiv (Cornell University), Apr. 2023, doi: 10.48550/arxiv.2304.14540.

[10] D. Pöhn and W. Hommel, “An overview of limitations and approaches in identity management,” An Overview of Limitations and Approaches in Identity Management, pp. 1–10, Aug. 2020, doi: 10.1145/3407023.3407026.

Downloads

Published

2025-02-14

How to Cite

AI Driven Identity Intelligence for Enterprise IAM: Predictive Risk Analytics and Automated Governance in Financial Cloud Environments. (2025). International Journal of Computer Technology and Electronics Communication, 8(1), 10110-10116. https://doi.org/10.15680/IJCTECE.2025.0801013