Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-fac...
Gespeichert in:
| Veröffentlicht in: | IEEE open journal of the Computer Society Jg. 6; S. 392 - 402 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 2644-1268, 2644-1268 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. The proposed system employs passwords, conditional attributes, and fingerprint authentication to derive the encryption key from fingerprint data. It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. The framework exhibited strong resilience against brute force, spoofing, phishing, guessing, and impersonation attacks. The proposed model achieved a commendable accuracy of 96.8%, outperforming other models. Implementing this framework in a cloud authentication environment significantly enhances data confidentiality and protects against unauthorized access. This study highlights the potential of combining multi-factor authentication and adaptive cryptography to obtain robust cloud security solutions. |
|---|---|
| AbstractList | The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. The proposed system employs passwords, conditional attributes, and fingerprint authentication to derive the encryption key from fingerprint data. It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. The framework exhibited strong resilience against brute force, spoofing, phishing, guessing, and impersonation attacks. The proposed model achieved a commendable accuracy of 96.8%, outperforming other models. Implementing this framework in a cloud authentication environment significantly enhances data confidentiality and protects against unauthorized access. This study highlights the potential of combining multi-factor authentication and adaptive cryptography to obtain robust cloud security solutions. |
| Author | Sasikumar, K. Nagarajan, Sivakumar |
| Author_xml | – sequence: 1 givenname: K. orcidid: 0009-0007-8844-6654 surname: Sasikumar fullname: Sasikumar, K. organization: School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India – sequence: 2 givenname: Sivakumar orcidid: 0000-0002-8945-6412 surname: Nagarajan fullname: Nagarajan, Sivakumar email: nsivakumar@vit.ac.in organization: School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India |
| BookMark | eNp9UU1r3DAUNCWFpml-QKEHQc-71Ydlyb0Zk7QpG3JIchbP8vNaiyu5shxY6I-vnU0h9NDTezxmhjcz77MzHzxm2UdGt4zR8svdj_p-yymXWyGFllK9yc55kecbxgt99mp_l11O04HSBcoYE_I8-33le_DW-T2phzC35B7tHF06fiUVuZ2H5DbXYFOIpJpTjz45C8kFT8C3pGphTO4JSR2PYwr7CGN_JNU4xgC2J4_TKnu7rM4j2SFEvx4e0Pbe_Zpx-pC97WCY8PJlXmSP11cP9ffN7u7bTV3tNjanMm20KLtcKopUsdJKBhqwRNl0LSquC44dtZh3TdGCwq7JQWsqSwu25U1DVScuspuTbhvgYMbofkI8mgDOPB9C3BuIi7MBDapC0EJgKRvIOXSNYgo55zLXVqNsF63PJ63F5OohmUOYo1_eN4KpnCnJZbmg1AllY5imiJ2xLj0HlyK4wTBq1ubM2pxZmzMvzS1M9g_z77__43w6cRwivsLrJR5BxR9LlKeu |
| CODEN | IOJCB2 |
| CitedBy_id | crossref_primary_10_54392_irjmt25410 |
| Cites_doi | 10.1109/NCCC49330.2021.9428806 10.3390/cryptography2010001 10.1007/s40747-021-00305-0 10.1109/MilCIS.2015.7348942 10.1016/j.procs.2016.07.335 10.37934/araset.44.1.225238 10.1007/s11042-024-18147-6 10.1016/j.jisa.2023.103628 10.32604/cmc.2021.016068 10.1109/ACCESS.2020.2980739 10.3390/s22197655 10.7717/peerj-cs.569 10.1109/access.2019.2899359 10.3390/s20154212 10.1007/s41939-019-00049-y 10.1007/978-3-030-90072-4_16 10.1016/j.matpr.2020.08.742 10.3390/app10082961 10.1109/access.2017.2717862 10.1109/ICONAT53423.2022.9725889 10.1007/s12652-019-01395-y 10.54646/bijcs.019 10.1016/j.comcom.2020.04.057 10.3390/app13031374 10.3390/app132413310 10.4018/IJCAC.2020040104 10.1007/978-981-16-3246-4_54 10.1155/2022/7540891 10.1109/SERA.2019.8886794 10.11591/ijict.v13i1.pp9-26 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D DOA |
| DOI | 10.1109/OJCS.2025.3538557 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journal Collection url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2644-1268 |
| EndPage | 402 |
| ExternalDocumentID | oai_doaj_org_article_e763063e95ba42afb717e222548c8e5d 10_1109_OJCS_2025_3538557 10872830 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Vellore Institute of Technology, Vellore 632014, India |
| GroupedDBID | 0R~ 97E AAJGR ABAZT ABVLG ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ IEDLZ JAVBF M~E OCL OK1 RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c405t-839f4570e0719c51a8ae9e5bfde72862ef0ce4fb6da7efb4a88059cacd2bb07f3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001438157400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2644-1268 |
| IngestDate | Fri Oct 03 12:48:20 EDT 2025 Mon Jun 30 12:15:25 EDT 2025 Sat Nov 29 08:00:14 EST 2025 Tue Nov 18 22:42:25 EST 2025 Wed Apr 23 05:41:08 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c405t-839f4570e0719c51a8ae9e5bfde72862ef0ce4fb6da7efb4a88059cacd2bb07f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0009-0007-8844-6654 0000-0002-8945-6412 |
| OpenAccessLink | https://doaj.org/article/e763063e95ba42afb717e222548c8e5d |
| PQID | 3174175259 |
| PQPubID | 5075782 |
| PageCount | 11 |
| ParticipantIDs | crossref_citationtrail_10_1109_OJCS_2025_3538557 crossref_primary_10_1109_OJCS_2025_3538557 ieee_primary_10872830 doaj_primary_oai_doaj_org_article_e763063e95ba42afb717e222548c8e5d proquest_journals_3174175259 |
| PublicationCentury | 2000 |
| PublicationDate | 20250000 2025-00-00 20250101 2025-01-01 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – year: 2025 text: 20250000 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE open journal of the Computer Society |
| PublicationTitleAbbrev | OJCS |
| PublicationYear | 2025 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | Anusha (ref8) 2012; 4 ref12 ref34 ref15 ref37 ref36 ref31 ref30 Kumar (ref33) 2023; 2 ref11 ref10 ref2 ref1 Sagar (ref14) 2018; 6 ref17 Deshmukh (ref35) 2024 ref39 ref16 ref38 ref19 ref18 Singh (ref13) 2019; 10 Sudha (ref6) 2019; 9 Mohammed Ubada (ref22) 2022; 22 ref24 ref23 ref26 ref25 ref20 ref21 ref28 ref27 ref29 ref7 ref4 Patil (ref32) 2019; 6 ref3 ref5 (ref9) 2023 |
| References_xml | – ident: ref20 doi: 10.1109/NCCC49330.2021.9428806 – ident: ref5 doi: 10.3390/cryptography2010001 – ident: ref25 doi: 10.1007/s40747-021-00305-0 – ident: ref34 doi: 10.1109/MilCIS.2015.7348942 – ident: ref2 doi: 10.1016/j.procs.2016.07.335 – volume: 4 start-page: 4433 issue: 6 year: 2012 ident: ref8 article-title: A review on secured file system using multi-factor authentication with visual cryptography for cloud environment publication-title: Int. Res. J. Modernization Eng. Technol. Sci. – volume: 10 start-page: 184 issue: 1 volume-title: Int. J. Comput. Eng. Technol. year: 2019 ident: ref13 article-title: A 3-level multifactor authentication scheme for cloud computing – volume: 6 start-page: 76 issue: 6 year: 2018 ident: ref14 article-title: Authentication system using cryptographic secure password storage publication-title: Int. J. Innov. Res. Eng. Multidisciplinary Phys. Sci. – ident: ref28 doi: 10.37934/araset.44.1.225238 – ident: ref26 doi: 10.1007/s11042-024-18147-6 – ident: ref31 doi: 10.1016/j.jisa.2023.103628 – ident: ref4 doi: 10.32604/cmc.2021.016068 – ident: ref17 doi: 10.1109/ACCESS.2020.2980739 – volume: 22 start-page: 481 issue: 9 year: 2022 ident: ref22 article-title: Evaluation of multifactor user security through multi authentication verifiable hybrid revert encryption for cloud computing environment publication-title: Int. J. Comput. Sci. Netw. Secur. – ident: ref10 doi: 10.3390/s22197655 – ident: ref21 doi: 10.7717/peerj-cs.569 – ident: ref12 doi: 10.1109/access.2019.2899359 – ident: ref16 doi: 10.3390/s20154212 – ident: ref15 doi: 10.1007/s41939-019-00049-y – ident: ref38 doi: 10.1007/978-3-030-90072-4_16 – ident: ref37 doi: 10.1016/j.matpr.2020.08.742 – ident: ref36 doi: 10.3390/app10082961 – ident: ref7 doi: 10.1109/access.2017.2717862 – ident: ref39 doi: 10.1109/ICONAT53423.2022.9725889 – ident: ref3 doi: 10.1007/s12652-019-01395-y – ident: ref1 doi: 10.54646/bijcs.019 – ident: ref19 doi: 10.1016/j.comcom.2020.04.057 – ident: ref24 doi: 10.3390/app13031374 – ident: ref30 doi: 10.3390/app132413310 – volume: 6 start-page: 1 issue: 9 year: 2019 ident: ref32 article-title: Different techniques used in the process of feature extraction from fingerprint publication-title: Int. J. Innov. Eng. Res. Technol. – volume: 9 start-page: 359 issue: 1 year: 2019 ident: ref6 article-title: A survey on different authentication schemes in cloud computing environment publication-title: Int. J. Manage., IT Eng. – year: 2023 ident: ref9 article-title: What is password encryption and how does it work – ident: ref18 doi: 10.4018/IJCAC.2020040104 – volume: 2 start-page: 26 issue: 1 year: 2023 ident: ref33 article-title: Biometric cryptosystem based on fingerprint authentication and cryptography technique publication-title: Int. Res. J. PMC – ident: ref11 doi: 10.1007/978-981-16-3246-4_54 – year: 2024 ident: ref35 article-title: Fingerprint-feature-extraction – ident: ref23 doi: 10.1155/2022/7540891 – ident: ref29 doi: 10.1109/SERA.2019.8886794 – ident: ref27 doi: 10.11591/ijict.v13i1.pp9-26 |
| SSID | ssj0002511135 |
| Score | 2.2993007 |
| Snippet | The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication... |
| SourceID | doaj proquest crossref ieee |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 392 |
| SubjectTerms | Adaptive cryptography Algorithms attack prediction Authentication Biometrics Cloud computing cloud security Cryptography Cybersecurity dual encryption dynamic encryption algorithms Encryption Fingerprint recognition Fingerprint verification Heuristic algorithms hybrid CNN-transformer model Machine learning machine learning techniques multi-factor authentication Passwords Prediction algorithms Security Spoofing |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEBZJyCGXpk1TumladMip4NS2JNvqbbtkKYUmgaSQm9BjlBaCd9lHodAf3xlZuwRCC70ZI_nBp5G-GY2-YeysFjaAD7Gw2jaFFI0unGjrQkjhtZZWRWlTsYn28rK7u9PX-bB6OgsDACn5DM7pMu3lh5lfU6gMLbxrSbBql-22bTMc1toGVIgrV0Llncuq1B-uvkxu0AOs1blAs1a0Aj1ae5JEf66p8mQiTqvL9PA_v-s5e5ZpJB8PuL9gO9AfscNNiQaeLfYl-33RfydFjf6eTx5m68Bvcr26j3zM0-HbYpoq7nCKlVHm0BDC47YPfBzsnGZDPln8mq-ytjUfZxVynrIN-NeUjQk8C7Xe89uNKuzymH2bXtxOPhe54ELhkbetCiRLUaq2BOQd2qvKdhY0KBcD4P81NcTSg4yuCbaF6KRF41faWx9q58o2ildsr5_18JrxSnQWqU5HQub4yGgdLsYQmso7ZEyVG7FyA4XxWY2cimI8mOSVlNoQeobQMxm9EXu_7TIfpDj-1fgT4bttSCra6QYCZ7JRGsDJFSkaaOWsrG106NsCOcCy8x2oMGLHBPajtw04j9jpZriYbPJLg0RMIhdDd_LkL93esAP6xCGAc8r2Vos1vGX7_ufqx3LxLo3mP5zr9Ts priority: 102 providerName: IEEE |
| Title | Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques |
| URI | https://ieeexplore.ieee.org/document/10872830 https://www.proquest.com/docview/3174175259 https://doaj.org/article/e763063e95ba42afb717e222548c8e5d |
| Volume | 6 |
| WOSCitedRecordID | wos001438157400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journal Collection customDbUrl: eissn: 2644-1268 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002511135 issn: 2644-1268 databaseCode: DOA dateStart: 20200101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2644-1268 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002511135 issn: 2644-1268 databaseCode: M~E dateStart: 20200101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYh5NBLm6Qp3TQNOvQUcGNb0trqbbvsEgp5QFLITegxSgvBWXY3hUDIb--MrA0LhfSSiw_GtmzN6xt59A1jX2phA_gQC6vtsJBiqAsnmroQUnitpVVR2tRsojk7a6-v9cVaqy-qCevpgfuJOwY0AAyjoJWzsrbRYf4BlKTI1regAnnfstFryRT5YALOlVD5N2ZV6uPzH-NLTAdr9VWgjSsKR2uBKPH15wYr_3jlFGqm2-xtxoh81L_bDtuAbpe9W_Vf4Nkc37PHSfeL6DK6Gz6-vbsP_DI3o_vGRzztrC2mqZ0Op4UwKgvq1-e47QIfBTsjV8fH84fZMhNX81GmGOeplICfplJL4JmF9YZfrShfF3vs53RyNT4pcjeFwiMoWxaIhKJUTQkIKrRXlW0taFAuBmhqzGsglh5kdMNgG4hOWrRspb31oXaubKL4wDa7uw4-Ml6J1iKOaYmlHB8ZrcNIC2FYeYdwqHIDVq6m1vhMNU4dL25NSjlKbUgahqRhsjQG7Oj5llnPs_HSxd9JXs8XEkV2OoGKY7LimP8pzoDtkbTXRmsbYkMbsIOV-E2254VBlCURaGGuuP8aY39ib-h7-qWcA7a5nN_DZ7bl_yx_L-aHSZXxePo0OUwbEv8Cdoj5kQ |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1baxQxFA5aBX2xXlpcbTUPPglT55LMTHzbLl2qtqvQFfoWcjmpQpld9iII_njPyWSXglTo2zAkc-HLSb5zcvIdxt6VlfHgfMiMMnUmqlpltmrKrBKVU0oYGYSJxSaayaS9vFTf0mH1eBYGAGLyGRzRZdzL9zO3plAZWnjbkGDVffZAClHm_XGtbUiF2HJRybR3WeTqw9fPowv0AUt5VKFhS1qDbqw-UaQ_VVX5ZyqO68t4945f9pQ9SUSSD3vkn7F70D1nu5siDTzZ7Av256T7QZoa3RUfXc_Wnl-kinUf-ZDH47fZONbc4RQto9yhPojHTef50Js5zYd8tPg9XyV1az5MOuQ85hvw85iPCTxJtV7x6UYXdrnHvo9PpqPTLJVcyBwyt1WGdCkI2eSAzEM5WZjWgAJpgwf8v7qEkDsQwdbeNBCsMGj-UjnjfGlt3oRqn-10sw5eMl5UrUGy05KUOT4yGIvLMfi6cBY5U2EHLN9AoV3SI6eyGNc6-iW50oSeJvR0Qm_A3m-7zHsxjv81PiZ8tw1JRzveQOB0MksNOL0iSQMlrRGlCRa9WyAXWLSuBekHbI_AvvG2HucBO9gMF52MfqmRiglkY-hQvrql21v26HR6fqbPPk2-vGaP6XP7cM4B21kt1nDIHrpfq5_LxZs4sv8CfGT4gg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+Cloud+Security%3A+A+Multi-Factor+Authentication+and+Adaptive+Cryptography+Approach+Using+Machine+Learning+Techniques&rft.jtitle=IEEE+open+journal+of+the+Computer+Society&rft.au=Sasikumar%2C+K.&rft.au=Nagarajan%2C+Sivakumar&rft.date=2025&rft.pub=IEEE&rft.eissn=2644-1268&rft.volume=6&rft.spage=392&rft.epage=402&rft_id=info:doi/10.1109%2FOJCS.2025.3538557&rft.externalDocID=10872830 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2644-1268&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2644-1268&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2644-1268&client=summon |