WSEAS Transactions on Information Science and Applications
Print ISSN: 1790-0832, E-ISSN: 2224-3402
Volume 22, 2025
Cloud Access Security Brokers: An easy-implement Method for Accessing Cloud Services Securely
Authors: , ,
Abstract: In this changing digital age, cloud services have become very common. But the main challenge is to provide secure access to cloud services for retailers and users and also for providers. Read here The Important Role of Cloud Access Security Brokers (CASBs). Either on-premise or cloud, CASBs take the place of hardened enforcement points of security in policy that are capable of bringing corporate security policy together, layering it on top of cloud resource access. These essential functions include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, many more. But in general, the most common challenges for CASBS provide these in the cloud: threat detection, access control policy enforcement, risk assessment, data protection and compliance. The literature survey presented in this paper focuses on these threats and vulnerabilities, and clearly highlight the requirement of improved protective processes in Cloud computing. Complementing CASBs with machine learning (ML) is at the heart of our proposed solution. If you are only looking at how well ML algorithms worked in detecting real-time threats, or in automating access control policies, comprehensive risk assessments, classifying sensitive data and monitoring compliance Machine learning techniques like Decision Tree and Random Forest algorithms have been applied with the initiative taken by us on CSE-CICIDS database, a real-world dataset that is described with the characteristics for cloud utilization behaviors along with limited numbers of security violation incidents occurred. The Random Forest Algorithm is performing considerably better than others, it has perfect precision, recall and F1-scores, it is able to predict all the records in the data set correctly.
Search Articles
Keywords: Cloud Access Security Brokers, CASBs, security policy enforcement, authentication, single sign-on, encryption, cloud compliance, machine learning, real-time threat detection, CSE-CICIDS database
Pages: 189-202
DOI: 10.37394/23209.2025.22.17