Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques

The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-fac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE open journal of the Computer Society Jg. 6; S. 392 - 402
Hauptverfasser: Sasikumar, K., Nagarajan, Sivakumar
Format: Journal Article
Sprache:Englisch
Veröffentlicht: New York IEEE 2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:2644-1268, 2644-1268
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. The proposed system employs passwords, conditional attributes, and fingerprint authentication to derive the encryption key from fingerprint data. It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. The framework exhibited strong resilience against brute force, spoofing, phishing, guessing, and impersonation attacks. The proposed model achieved a commendable accuracy of 96.8%, outperforming other models. Implementing this framework in a cloud authentication environment significantly enhances data confidentiality and protects against unauthorized access. This study highlights the potential of combining multi-factor authentication and adaptive cryptography to obtain robust cloud security solutions.
AbstractList The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. The proposed system employs passwords, conditional attributes, and fingerprint authentication to derive the encryption key from fingerprint data. It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. The framework exhibited strong resilience against brute force, spoofing, phishing, guessing, and impersonation attacks. The proposed model achieved a commendable accuracy of 96.8%, outperforming other models. Implementing this framework in a cloud authentication environment significantly enhances data confidentiality and protects against unauthorized access. This study highlights the potential of combining multi-factor authentication and adaptive cryptography to obtain robust cloud security solutions.
Author Sasikumar, K.
Nagarajan, Sivakumar
Author_xml – sequence: 1
  givenname: K.
  orcidid: 0009-0007-8844-6654
  surname: Sasikumar
  fullname: Sasikumar, K.
  organization: School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
– sequence: 2
  givenname: Sivakumar
  orcidid: 0000-0002-8945-6412
  surname: Nagarajan
  fullname: Nagarajan, Sivakumar
  email: nsivakumar@vit.ac.in
  organization: School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India
BookMark eNp9UU1r3DAUNCWFpml-QKEHQc-71Ydlyb0Zk7QpG3JIchbP8vNaiyu5shxY6I-vnU0h9NDTezxmhjcz77MzHzxm2UdGt4zR8svdj_p-yymXWyGFllK9yc55kecbxgt99mp_l11O04HSBcoYE_I8-33le_DW-T2phzC35B7tHF06fiUVuZ2H5DbXYFOIpJpTjz45C8kFT8C3pGphTO4JSR2PYwr7CGN_JNU4xgC2J4_TKnu7rM4j2SFEvx4e0Pbe_Zpx-pC97WCY8PJlXmSP11cP9ffN7u7bTV3tNjanMm20KLtcKopUsdJKBhqwRNl0LSquC44dtZh3TdGCwq7JQWsqSwu25U1DVScuspuTbhvgYMbofkI8mgDOPB9C3BuIi7MBDapC0EJgKRvIOXSNYgo55zLXVqNsF63PJ63F5OohmUOYo1_eN4KpnCnJZbmg1AllY5imiJ2xLj0HlyK4wTBq1ubM2pxZmzMvzS1M9g_z77__43w6cRwivsLrJR5BxR9LlKeu
CODEN IOJCB2
CitedBy_id crossref_primary_10_54392_irjmt25410
Cites_doi 10.1109/NCCC49330.2021.9428806
10.3390/cryptography2010001
10.1007/s40747-021-00305-0
10.1109/MilCIS.2015.7348942
10.1016/j.procs.2016.07.335
10.37934/araset.44.1.225238
10.1007/s11042-024-18147-6
10.1016/j.jisa.2023.103628
10.32604/cmc.2021.016068
10.1109/ACCESS.2020.2980739
10.3390/s22197655
10.7717/peerj-cs.569
10.1109/access.2019.2899359
10.3390/s20154212
10.1007/s41939-019-00049-y
10.1007/978-3-030-90072-4_16
10.1016/j.matpr.2020.08.742
10.3390/app10082961
10.1109/access.2017.2717862
10.1109/ICONAT53423.2022.9725889
10.1007/s12652-019-01395-y
10.54646/bijcs.019
10.1016/j.comcom.2020.04.057
10.3390/app13031374
10.3390/app132413310
10.4018/IJCAC.2020040104
10.1007/978-981-16-3246-4_54
10.1155/2022/7540891
10.1109/SERA.2019.8886794
10.11591/ijict.v13i1.pp9-26
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2025
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/OJCS.2025.3538557
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journal Collection
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2644-1268
EndPage 402
ExternalDocumentID oai_doaj_org_article_e763063e95ba42afb717e222548c8e5d
10_1109_OJCS_2025_3538557
10872830
Genre orig-research
GrantInformation_xml – fundername: Vellore Institute of Technology, Vellore 632014, India
GroupedDBID 0R~
97E
AAJGR
ABAZT
ABVLG
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
ESBDL
GROUPED_DOAJ
IEDLZ
JAVBF
M~E
OCL
OK1
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c405t-839f4570e0719c51a8ae9e5bfde72862ef0ce4fb6da7efb4a88059cacd2bb07f3
IEDL.DBID DOA
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001438157400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2644-1268
IngestDate Fri Oct 03 12:48:20 EDT 2025
Mon Jun 30 12:15:25 EDT 2025
Sat Nov 29 08:00:14 EST 2025
Tue Nov 18 22:42:25 EST 2025
Wed Apr 23 05:41:08 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c405t-839f4570e0719c51a8ae9e5bfde72862ef0ce4fb6da7efb4a88059cacd2bb07f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0009-0007-8844-6654
0000-0002-8945-6412
OpenAccessLink https://doaj.org/article/e763063e95ba42afb717e222548c8e5d
PQID 3174175259
PQPubID 5075782
PageCount 11
ParticipantIDs crossref_citationtrail_10_1109_OJCS_2025_3538557
crossref_primary_10_1109_OJCS_2025_3538557
ieee_primary_10872830
doaj_primary_oai_doaj_org_article_e763063e95ba42afb717e222548c8e5d
proquest_journals_3174175259
PublicationCentury 2000
PublicationDate 20250000
2025-00-00
20250101
2025-01-01
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 20250000
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE open journal of the Computer Society
PublicationTitleAbbrev OJCS
PublicationYear 2025
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References Anusha (ref8) 2012; 4
ref12
ref34
ref15
ref37
ref36
ref31
ref30
Kumar (ref33) 2023; 2
ref11
ref10
ref2
ref1
Sagar (ref14) 2018; 6
ref17
Deshmukh (ref35) 2024
ref39
ref16
ref38
ref19
ref18
Singh (ref13) 2019; 10
Sudha (ref6) 2019; 9
Mohammed Ubada (ref22) 2022; 22
ref24
ref23
ref26
ref25
ref20
ref21
ref28
ref27
ref29
ref7
ref4
Patil (ref32) 2019; 6
ref3
ref5
(ref9) 2023
References_xml – ident: ref20
  doi: 10.1109/NCCC49330.2021.9428806
– ident: ref5
  doi: 10.3390/cryptography2010001
– ident: ref25
  doi: 10.1007/s40747-021-00305-0
– ident: ref34
  doi: 10.1109/MilCIS.2015.7348942
– ident: ref2
  doi: 10.1016/j.procs.2016.07.335
– volume: 4
  start-page: 4433
  issue: 6
  year: 2012
  ident: ref8
  article-title: A review on secured file system using multi-factor authentication with visual cryptography for cloud environment
  publication-title: Int. Res. J. Modernization Eng. Technol. Sci.
– volume: 10
  start-page: 184
  issue: 1
  volume-title: Int. J. Comput. Eng. Technol.
  year: 2019
  ident: ref13
  article-title: A 3-level multifactor authentication scheme for cloud computing
– volume: 6
  start-page: 76
  issue: 6
  year: 2018
  ident: ref14
  article-title: Authentication system using cryptographic secure password storage
  publication-title: Int. J. Innov. Res. Eng. Multidisciplinary Phys. Sci.
– ident: ref28
  doi: 10.37934/araset.44.1.225238
– ident: ref26
  doi: 10.1007/s11042-024-18147-6
– ident: ref31
  doi: 10.1016/j.jisa.2023.103628
– ident: ref4
  doi: 10.32604/cmc.2021.016068
– ident: ref17
  doi: 10.1109/ACCESS.2020.2980739
– volume: 22
  start-page: 481
  issue: 9
  year: 2022
  ident: ref22
  article-title: Evaluation of multifactor user security through multi authentication verifiable hybrid revert encryption for cloud computing environment
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– ident: ref10
  doi: 10.3390/s22197655
– ident: ref21
  doi: 10.7717/peerj-cs.569
– ident: ref12
  doi: 10.1109/access.2019.2899359
– ident: ref16
  doi: 10.3390/s20154212
– ident: ref15
  doi: 10.1007/s41939-019-00049-y
– ident: ref38
  doi: 10.1007/978-3-030-90072-4_16
– ident: ref37
  doi: 10.1016/j.matpr.2020.08.742
– ident: ref36
  doi: 10.3390/app10082961
– ident: ref7
  doi: 10.1109/access.2017.2717862
– ident: ref39
  doi: 10.1109/ICONAT53423.2022.9725889
– ident: ref3
  doi: 10.1007/s12652-019-01395-y
– ident: ref1
  doi: 10.54646/bijcs.019
– ident: ref19
  doi: 10.1016/j.comcom.2020.04.057
– ident: ref24
  doi: 10.3390/app13031374
– ident: ref30
  doi: 10.3390/app132413310
– volume: 6
  start-page: 1
  issue: 9
  year: 2019
  ident: ref32
  article-title: Different techniques used in the process of feature extraction from fingerprint
  publication-title: Int. J. Innov. Eng. Res. Technol.
– volume: 9
  start-page: 359
  issue: 1
  year: 2019
  ident: ref6
  article-title: A survey on different authentication schemes in cloud computing environment
  publication-title: Int. J. Manage., IT Eng.
– year: 2023
  ident: ref9
  article-title: What is password encryption and how does it work
– ident: ref18
  doi: 10.4018/IJCAC.2020040104
– volume: 2
  start-page: 26
  issue: 1
  year: 2023
  ident: ref33
  article-title: Biometric cryptosystem based on fingerprint authentication and cryptography technique
  publication-title: Int. Res. J. PMC
– ident: ref11
  doi: 10.1007/978-981-16-3246-4_54
– year: 2024
  ident: ref35
  article-title: Fingerprint-feature-extraction
– ident: ref23
  doi: 10.1155/2022/7540891
– ident: ref29
  doi: 10.1109/SERA.2019.8886794
– ident: ref27
  doi: 10.11591/ijict.v13i1.pp9-26
SSID ssj0002511135
Score 2.2993007
Snippet The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 392
SubjectTerms Adaptive cryptography
Algorithms
attack prediction
Authentication
Biometrics
Cloud computing
cloud security
Cryptography
Cybersecurity
dual encryption
dynamic encryption algorithms
Encryption
Fingerprint recognition
Fingerprint verification
Heuristic algorithms
hybrid CNN-transformer model
Machine learning
machine learning techniques
multi-factor authentication
Passwords
Prediction algorithms
Security
Spoofing
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEBZJyCGXpk1TumladMip4NS2JNvqbbtkKYUmgaSQm9BjlBaCd9lHodAf3xlZuwRCC70ZI_nBp5G-GY2-YeysFjaAD7Gw2jaFFI0unGjrQkjhtZZWRWlTsYn28rK7u9PX-bB6OgsDACn5DM7pMu3lh5lfU6gMLbxrSbBql-22bTMc1toGVIgrV0Llncuq1B-uvkxu0AOs1blAs1a0Aj1ae5JEf66p8mQiTqvL9PA_v-s5e5ZpJB8PuL9gO9AfscNNiQaeLfYl-33RfydFjf6eTx5m68Bvcr26j3zM0-HbYpoq7nCKlVHm0BDC47YPfBzsnGZDPln8mq-ytjUfZxVynrIN-NeUjQk8C7Xe89uNKuzymH2bXtxOPhe54ELhkbetCiRLUaq2BOQd2qvKdhY0KBcD4P81NcTSg4yuCbaF6KRF41faWx9q58o2ildsr5_18JrxSnQWqU5HQub4yGgdLsYQmso7ZEyVG7FyA4XxWY2cimI8mOSVlNoQeobQMxm9EXu_7TIfpDj-1fgT4bttSCra6QYCZ7JRGsDJFSkaaOWsrG106NsCOcCy8x2oMGLHBPajtw04j9jpZriYbPJLg0RMIhdDd_LkL93esAP6xCGAc8r2Vos1vGX7_ufqx3LxLo3mP5zr9Ts
  priority: 102
  providerName: IEEE
Title Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
URI https://ieeexplore.ieee.org/document/10872830
https://www.proquest.com/docview/3174175259
https://doaj.org/article/e763063e95ba42afb717e222548c8e5d
Volume 6
WOSCitedRecordID wos001438157400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journal Collection
  customDbUrl:
  eissn: 2644-1268
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002511135
  issn: 2644-1268
  databaseCode: DOA
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2644-1268
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002511135
  issn: 2644-1268
  databaseCode: M~E
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYh5NBLm6Qp3TQNOvQUcGNb0trqbbvsEgp5QFLITegxSgvBWXY3hUDIb--MrA0LhfSSiw_GtmzN6xt59A1jX2phA_gQC6vtsJBiqAsnmroQUnitpVVR2tRsojk7a6-v9cVaqy-qCevpgfuJOwY0AAyjoJWzsrbRYf4BlKTI1regAnnfstFryRT5YALOlVD5N2ZV6uPzH-NLTAdr9VWgjSsKR2uBKPH15wYr_3jlFGqm2-xtxoh81L_bDtuAbpe9W_Vf4Nkc37PHSfeL6DK6Gz6-vbsP_DI3o_vGRzztrC2mqZ0Op4UwKgvq1-e47QIfBTsjV8fH84fZMhNX81GmGOeplICfplJL4JmF9YZfrShfF3vs53RyNT4pcjeFwiMoWxaIhKJUTQkIKrRXlW0taFAuBmhqzGsglh5kdMNgG4hOWrRspb31oXaubKL4wDa7uw4-Ml6J1iKOaYmlHB8ZrcNIC2FYeYdwqHIDVq6m1vhMNU4dL25NSjlKbUgahqRhsjQG7Oj5llnPs_HSxd9JXs8XEkV2OoGKY7LimP8pzoDtkbTXRmsbYkMbsIOV-E2254VBlCURaGGuuP8aY39ib-h7-qWcA7a5nN_DZ7bl_yx_L-aHSZXxePo0OUwbEv8Cdoj5kQ
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1baxQxFA5aBX2xXlpcbTUPPglT55LMTHzbLl2qtqvQFfoWcjmpQpld9iII_njPyWSXglTo2zAkc-HLSb5zcvIdxt6VlfHgfMiMMnUmqlpltmrKrBKVU0oYGYSJxSaayaS9vFTf0mH1eBYGAGLyGRzRZdzL9zO3plAZWnjbkGDVffZAClHm_XGtbUiF2HJRybR3WeTqw9fPowv0AUt5VKFhS1qDbqw-UaQ_VVX5ZyqO68t4945f9pQ9SUSSD3vkn7F70D1nu5siDTzZ7Av256T7QZoa3RUfXc_Wnl-kinUf-ZDH47fZONbc4RQto9yhPojHTef50Js5zYd8tPg9XyV1az5MOuQ85hvw85iPCTxJtV7x6UYXdrnHvo9PpqPTLJVcyBwyt1WGdCkI2eSAzEM5WZjWgAJpgwf8v7qEkDsQwdbeNBCsMGj-UjnjfGlt3oRqn-10sw5eMl5UrUGy05KUOT4yGIvLMfi6cBY5U2EHLN9AoV3SI6eyGNc6-iW50oSeJvR0Qm_A3m-7zHsxjv81PiZ8tw1JRzveQOB0MksNOL0iSQMlrRGlCRa9WyAXWLSuBekHbI_AvvG2HucBO9gMF52MfqmRiglkY-hQvrql21v26HR6fqbPPk2-vGaP6XP7cM4B21kt1nDIHrpfq5_LxZs4sv8CfGT4gg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancing+Cloud+Security%3A+A+Multi-Factor+Authentication+and+Adaptive+Cryptography+Approach+Using+Machine+Learning+Techniques&rft.jtitle=IEEE+open+journal+of+the+Computer+Society&rft.au=Sasikumar%2C+K.&rft.au=Nagarajan%2C+Sivakumar&rft.date=2025&rft.pub=IEEE&rft.eissn=2644-1268&rft.volume=6&rft.spage=392&rft.epage=402&rft_id=info:doi/10.1109%2FOJCS.2025.3538557&rft.externalDocID=10872830
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2644-1268&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2644-1268&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2644-1268&client=summon