{"id":241469,"date":"2026-01-29T16:19:51","date_gmt":"2026-01-29T16:19:51","guid":{"rendered":"https:\/\/businesnewswire.com\/?p=164868"},"modified":"2026-01-29T16:19:51","modified_gmt":"2026-01-29T16:19:51","slug":"a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography","status":"publish","type":"post","link":"https:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/","title":{"rendered":"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-164869\" src=\"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp\" alt=\"\" width=\"674\" height=\"812\" srcset=\"https:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp 674w, https:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa-249x300.webp 249w, https:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa-415x500.webp 415w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/p>\n<p>Cloud computing has become the foundation of the new digital infrastructure, where scalable data-driven applications are applicable in enterprises. The article by<strong> Naga Charan Nandigama<\/strong> introduces an information transformation method using the combination of Data Engineering and Data Science to enhance the security of the cloud using Multi-Factor Authentication (ML-MFA) and dynamic cryptography. His work is a drastic change from fixed, rule-based security systems to more risk-conscious, intelligent, and self-adaptive cloud protection systems.<\/p>\n<p><strong>Cloud Security Architecture Evolution<\/strong><\/p>\n<p>Classical models of cloud protection used to be based on dynamic authentication algorithm and fixed cryptographic settings. The strategies are not effective in a modern setting that faces attack vectors that utilize behavioral patterns, stolen credentials, and metadata leakage. The scope of authentication information grew exponentially in both size, speed, and type, and more sophisticated security measures were required. The framework considers this development by encompassing Data Engineering pipelines that have the capacity to take in and manipulate multimodal information streams, such as device fingerprints, geolocation notifications, and behavioral biometrics. The architecture boosts the creation of adaptable and intelligence-led cloud security by converting raw security telemetry into quality analytical datasets.<\/p>\n<p><strong>Smart Authentication with ML-Based MFA<\/strong><\/p>\n<p>One of the key contributions of the study is the application of Multi-Factor Authentication by using Machine Learning. As opposed to the traditional MFA systems, which practice uniformity in applying authentication rules, ML-based MFA works with contextual risk on dynamism. Near real-time analysis of the types of behavior, moment of access, device-specific attributes and anomaly scores can establish whether further authentication factors are needed. This mechanism of adaptability has a great increase in the resistance to credential-based attacks and minimizes the unnecessary user friction. The system can detect the hidden communication variations of users in the behavior context that are mostly not recognized by the existing methods using the supervised and unsupervised models of learning, which helps the system to execute proactive and accurate authentication actions.<\/p>\n<p><strong>Dynamic Self-Malware Threat Environment Adaptive Cryptography<\/strong><\/p>\n<p>Alongside smart authentication, the study offers the concept of adaptive cryptography enhancement that is fundamental to the research in security. Deterministic encryption models can be vulnerable to attackable predictable attack points, especially when lack of metadata or computational asymmetries is used by the maleficent. The proposed system dynamically changes the strength of encryption, the rate of key rotation, and the cryptographic algorithms in reference to the contextual risk scores produced by Data Science models.<\/p>\n<p><strong>Data Engineering and Edge -Fog-Cloud Integration Role<\/strong><\/p>\n<p>A layered Edge Cloud solution helps facilitate the success of the proposed framework. On the edge Ending with preliminary pre-processing and anomaly detection Limited the end-to-end latency as well as prevented suspicious behavior at the stage before proceeding further. Mog layer consolidates the events of various sources, feature engineering, and contextual embellishing on them to assist with low-latency inferences.<\/p>\n<p><strong>Experimental Insights and Performance Indications<\/strong><\/p>\n<p>The effectiveness of the integrated approach is supported by the results of the experiment. The ML-MFA and adaptive cryptography are the most probable to achieve maximum authentication accuracy and attack detection rates compared to the single-layer security and baseline security mechanisms. Although the change in adaptive cryptography results in moderate latency overhead, advantages in security are considerably larger than the trade-offs in performance. The results validate the synergistic benefits of layered, data-driven security models as compared to isolated controls, making the role of a holistic design of systems in a cloud security setting significant.<\/p>\n<p><strong>Overcoming the Scale and Governance Problems<\/strong><\/p>\n<p>Protecting consistent security over distributed environments becomes very tricky as the deployment of clouds incurs larger sizes. The framework proposed has a solution to scalability in the form of the distributed pipelines of data, the processing of the stream and the deployment on the basis of the models that can be separately distributed. At the layer level, the governance mechanisms of policy management, auditing, and compliance enforcement are combined in such a way to make adaptive security decisions transparent and regulation-compliant.<\/p>\n<p><strong>Trends in Intelligent Cloud Security<\/strong><\/p>\n<p>In future research, the study offers a clear future literature in relation to federated learning as a way of privacy-guaranteeing model updates, reinforcement learning as an inflexible cryptographic policy optimization tool, and explainable AI as a common Instinct intervention that could boost security decision transparency. These developments are meant to enhance further the levels of trust, interoperability and sustainability of cloud security architectures.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p><strong>Naga Charan Nandigama<\/strong> research work establishes that the combination of Data Engineering, Data Science, a machine learning-based MFA, and adaptive cryptography is the key to changing the essence of cloud security. The proposed framework overcomes the drawbacks of traditional security models by providing smart authentication, dynamical encryption and scalability in the decision-making process, providing a framework that is non-negligible to the current cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing has become the foundation of the new digital infrastructure, where scalable data-driven applications are applicable in enterprises. The article by Naga Charan Nandigama introduces an information transformation method using the combination of Data Engineering and Data Science to enhance the security of the cloud using Multi-Factor Authentication (ML-MFA) and dynamic cryptography. His work&#8230; <a href=\"https:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":344,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[374],"tags":[],"class_list":["post-241469","post","type-post","status-publish","format-standard","hentry","category-ipsnews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business\" \/>\n<meta property=\"og:description\" content=\"Cloud computing has become the foundation of the new digital infrastructure, where scalable data-driven applications are applicable in enterprises. The article by Naga Charan Nandigama introduces an information transformation method using the combination of Data Engineering and Data Science to enhance the security of the cloud using Multi-Factor Authentication (ML-MFA) and dynamic cryptography. His work... Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Business\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T16:19:51+00:00\" \/>\n<meta name=\"author\" content=\"Busines Newswire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Busines Newswire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\",\"url\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\",\"name\":\"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business\",\"isPartOf\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp\",\"datePublished\":\"2026-01-29T16:19:51+00:00\",\"author\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8\"},\"breadcrumb\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage\",\"url\":\"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp\",\"contentUrl\":\"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ipsnews.net\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipsnews.net\/business\/#website\",\"url\":\"https:\/\/ipsnews.net\/business\/\",\"name\":\"Business\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipsnews.net\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8\",\"name\":\"Busines Newswire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g\",\"caption\":\"Busines Newswire\"},\"sameAs\":[\"https:\/\/businesnewswire.com\"],\"url\":\"https:\/\/ipsnews.net\/business\/author\/busines-newswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business","og_description":"Cloud computing has become the foundation of the new digital infrastructure, where scalable data-driven applications are applicable in enterprises. The article by Naga Charan Nandigama introduces an information transformation method using the combination of Data Engineering and Data Science to enhance the security of the cloud using Multi-Factor Authentication (ML-MFA) and dynamic cryptography. His work... Continue Reading &rarr;","og_url":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/","og_site_name":"Business","article_published_time":"2026-01-29T16:19:51+00:00","author":"Busines Newswire","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Busines Newswire","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/","url":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/","name":"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography - Business","isPartOf":{"@id":"https:\/\/ipsnews.net\/business\/#website"},"primaryImageOfPage":{"@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage"},"image":{"@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage"},"thumbnailUrl":"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp","datePublished":"2026-01-29T16:19:51+00:00","author":{"@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8"},"breadcrumb":{"@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#primaryimage","url":"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp","contentUrl":"http:\/\/businesnewswire.com\/wp-content\/uploads\/2026\/01\/mfa.webp"},{"@type":"BreadcrumbList","@id":"http:\/\/ipsnews.net\/business\/2026\/01\/29\/a-data-engineering-and-data-science-approach-to-strengthening-cloud-security-through-ml-based-mfa-and-dynamic-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ipsnews.net\/business\/"},{"@type":"ListItem","position":2,"name":"A Data Engineering and Data Science Approach to Strengthening Cloud Security Through ML-Based MFA and Dynamic Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/ipsnews.net\/business\/#website","url":"https:\/\/ipsnews.net\/business\/","name":"Business","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsnews.net\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/457ba41b64cc345c2ab68ac8092bd5e8","name":"Busines Newswire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b21e185e011dc25167b5d0f8e948087219de9c5efa4828a2ee7e511b602d98d?s=96&d=mm&r=g","caption":"Busines Newswire"},"sameAs":["https:\/\/businesnewswire.com"],"url":"https:\/\/ipsnews.net\/business\/author\/busines-newswire\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/241469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/users\/344"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/comments?post=241469"}],"version-history":[{"count":2,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/241469\/revisions"}],"predecessor-version":[{"id":241522,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/241469\/revisions\/241522"}],"wp:attachment":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/media?parent=241469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/categories?post=241469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/tags?post=241469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}