based systems and single-factor authentication
models. The system is designed to be scalable,
adaptable, and resilient against modern cyber threats,
making it a powerful solution for organizations
seeking advanced digital security measures.
A second solution of this project is the secure file
management system, which incorporates the added
authorization system and allows the administrator to
decide which file should go to which user or group.
The files are kept safe and made available based on
roles and permissions within the system. The audit
trail feature ensures transparency by tracking how
files are accessed and modified, providing
accountability. This access control feature is
especially useful for organizations that need
compliance with regulatory rules governing the
access and storage of information.
This work has proposed a new system that
incorporates multi-modal challenges with random
challenges for user authentication, in addition to
integrating secure file management with a role-based
access control system. Adding an element of
unpredictability to the authentication procedure
decreases its predictability for attackers, while the
RBAC model guarantees that sensitive files are
protected and accessible only to those with the
necessary permissions. The dependency on extensive
training of models is reduced by utilizing pre-trained
models for face recognition and voice authentication.
All in all, the present work addresses primary
security deficiencies in current authentication and file
management methods. It integrates advanced
technologies such as face recognition, NLP, text
password authentication, OTP-based authentication,
and role-based access control (RBAC) to not only
enhance the authenticity of credentials but also
provide efficient methods for handling sensitive data.
This system is highly flexible and can easily be
expanded to suit the needs of organizations of any
size or specialty.
Consequently, the proposed advanced
authentication and secure file management system
provides a new concept of security for digital
resources. Through the integration of multi-modal
authentication and RBAC, it offers adequate security
while remaining user-friendly. This makes it a highly
useful tool for any organization seeking to enhance its
security infrastructure and protect its IT assets.
2 RELATED WORKS
In technologies for safe control (Houttuin 2024)
considers general blockchain-based authentication
systems suitable for the access control in the context
of the autonomous vehicles. The author goes further
to show that there is a growing demand for
decentralized and immutable systems and this is
evident in self-driving cars where data integrity is
paramount. Although the model presented here
guarantees strong security these challenges will still
slow the interaction between the CPS and the actual
vehicle systems. In real time vital decisions may be
made. These issues are solved in the proposed
solution by incorporation of a simplified
authentication process compatible with real-time
vehicular control systems.
(Nielsen 2023), discusses the human-centric
forms of authentication with reference to IoT-
connected self-driving cars. The research
demonstrates how users persistently contribute to
pervasive security in the design and implementation
of access control in dynamic IoT contexts.
Nevertheless, the aforementioned work of Nielsen
essentially covers the IoT and does not describe the
problems that arise in large vehicle networks. This is
well captured in the conceptual solution that also
considers both general IoT as well as specific to
vehicle security issues, enhancing the capacity of the
system in handling large scale AVs.
In the blockchain-based IoMT devices, Aslam et
al. (2024) present a new authentication model for the
medical users. Specifically, their work is centered on
the application of role-based access control (RBAC)
in conjunction with the blockchain technique to
protect the patients’ confidentiality and other critical
medical information. Although the above model
manages to ensure data integrity, there is a question
on the time taken to handle the resultant medical data.
The proposed system supplements this by
incorporating faster authentication mechanisms
which are very important in real-time medical
applications while at the same time guaranteeing the
security of the information as well as access to it at
the right time.
It is worthwhile to note that Edrah and Ouda
(2024) employ a statistical-based legitimate or
counterfeit identification to improve the security
system employed for access control. In their
specialism, their research is of concern to enhancing
recognition of fake credentials. However, as the
system heavily relies on statistical models it may take
considerable time in high throughput applications and
networks like industrial networks. This is realized in
the proposed solution which comprises real-time
detection mechanisms to cover high traffic volumes
while ensuring accurate detection.
Information security has been considered by