Enhancing Security Event Token Exchange in Cloud Environments
Authors- Oni Samuel Boluwatife
Abstract-In today’s globe, cloud calculating account for conventional methods of data storing and services delivery by providing scalability and accessibility. Nevertheless, security issues as a part of authentication and access control are still very important. OAuth, JWT and SAML are the examples of the security event token exchange mechanisms that are used to manage the access rights in cloud environments. Despite their advantages, there are challenges such as token theft, replay attacks, and what can be referred to as insider risks. Based on these risks this research outlines the following improvements to the security measures: token encryption, the storage of the tokens and comprehensive validation systems and improved access control measures. To enhance the firewall and the existing authorization and access control, the proposed solution has to employ AES-256 and RSA-4096 encryption, as well as HSMs for the token storing. The findings shown in the benchmark study prove there is increased security, low impact on performance and high security resistance. This makes the current research relevant in the improvement of secure authentication in the cloud computing architectures to further bolster the defense of the structure.