EconPapers    
Economics at your fingertips  
 

Cutting-Edge AI Techniques for Securing Healthcare IAM: A Novel Approach to SAML and OAuth Security

Mahendra Krishnapatnam ()

International Journal of Computing and Engineering, 2025, vol. 7, issue 2, 39 - 50

Abstract: Purpose: This study addresses the increasing limitations of traditional Identity and Access Management (IAM) systems based on OAuth and SAML protocols, which are vulnerable to evolving cyber threats such as token hijacking, phishing, replay attacks, and consent fraud. The purpose is to introduce an AI-driven threat detection framework that enhances identity security beyond conventional rule-based mechanisms. Methodology: The proposed framework integrates machine learning (ML), anomaly detection algorithms, and behavioral analytics to monitor and secure OAuth and SAML authentication workflows. Risk-based adaptive authentication (RBA) is utilized to assess contextual risk, while natural language processing (NLP) techniques are applied to validate OAuth consent flows. The effectiveness of the framework is evaluated through experimental simulations comparing AI-enhanced models with traditional IAM approaches. Findings: Experimental results demonstrate that the AI-based model improves detection of SAML assertion forgery by over 90% and reduces OAuth token misuse by 80%. These findings underscore the capability of AI to dynamically identify and mitigate identity-based threats in real time, significantly outperforming static rule-based systems. Unique contribution to theory, practice and policy: This research offers a practical AI-enhanced framework for securing IAM systems, enabling organizations to implement real-time threat detection, reduce identity fraud, and automate risk-based authentication and consent validation. By introducing NLP-driven consent verification and behavioral analytics, the framework enhances decision-making and user access governance across enterprise systems. From a policy standpoint, the study supports the evolution of cybersecurity and compliance models by demonstrating how AI can be systematically embedded into IAM infrastructures. It reinforces alignment with regulatory standards such as HIPAA and GDPR, encouraging the development of AI-inclusive policies for identity security, threat mitigation, and digital trust frameworks.

Keywords: AI-driven IAM; OAuth Security; SAML Threat Detection; Risk-Based Authentication; Zero Trust Security; Adaptive Authentication; Identity Protection; Anomaly Detection (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://carijournals.org/journals/article/view/2630/3048 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bhx:ojijce:v:7:y:2025:i:2:p:39-50:id:2630

Access Statistics for this article

More articles in International Journal of Computing and Engineering from CARI Journals Limited
Bibliographic data for series maintained by Chief Editor ().

 
Page updated 2025-04-07
Handle: RePEc:bhx:ojijce:v:7:y:2025:i:2:p:39-50:id:2630