SENTRIX: Session-Enabled, Network-Trust, Risk-Intelligent Exposure Architecture for Post-Authentication Cloud Security
Samiksha A. Choudhari
Diploma
Dept. of Computer Engineering
DR. PDGP, Amravati
Saket R. Bobade
Assistant Professor
Dept. of Computer Engineering
DR. PDGP, Amravati
Sumit M. Dhopte
H.O.D
Dept. of Computer Engineering
DR. PDGP, Amravati
Abstract-Cloud security mechanisms predominantly rely on static access control and post-hoc detection techniques that assume successful authentication implies sustained trust throughout a user session. In practice, a significant proportion of data breaches occur after authentication through compromised credentials, insider misuse, or gradual exploitation of authorized access, resulting in prolonged exposure of sensitive data before detection or intervention. This paper presents SENTRIX, a session-enabled, network-trust, risk-intelligent exposure architecture that reconceptualizes cloud data security by treating data visibility as a dynamically controlled variable rather than a binary access state. SENTRIX continuously constructs a session behavioral twin and computes a real-time trust score based on observed interaction patterns. Data exposure is adaptively reconstructed during the session, enabling progressive degradation through masking, precision reduction, throttling, and result limitation as trust declines. Upon trust collapse, the architecture enforces cryptographic containment by revoking session keys and re-encrypting sensitive data segments, rendering them inaccessible to the compromised session without permanent data loss. By coupling behavioral trust directly with data reconstruction and containment, SENTRIX minimizes cumulative data exposure during post-authentication breach windows and shifts cloud security from detection-centric defense to proactive damage minimization. The proposed architecture is domain-agnostic, cloud-deployable, and compatible with existing identity and access management systems, offering a practical and scalable approach to mitigating modern cloud security threats.
Keywords: session security, adaptive data exposure, behavioral trust, cloud security architecture, cryptographic containment, post-authentication defense.