An Enhanced Secure Framework for Detecting and Rectifying Unauthorized Access in Cloud Computing Environments Using the Elliptic Curve Digital Signature Algorithm
Received: 28 November 2024 | Revised: 4 February 2025, 26 February 2025, 25 March 2025, and 9 April 2025 | Accepted: 12 April 2025 | Online: 2 August 2025
Corresponding author: Mallikarjunaswamy Srikantaswamy
Abstract
While cloud computing environments offer significant advantages, they also pose serious security challenges, especially in the detection and rectification of unauthorized access. Traditional methods, including Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Advanced Encryption Standard (AES), are widely used but suffer from a number of drawbacks, including high computational cost, scalability issues, and vulnerability to modern cyber-attacks. This reduces their effectiveness in ensuring real-time security and efficient access management in cloud systems. The aforementioned limitations are addressed by the proposed Enhanced Secure Detection and Rectification Framework (E-SDRF), which is based on the Elliptic Curve Digital Signature Algorithm (ECDSA) method. By employing this method, cloud security is enhanced through the implementation of more robust authentication, faster detection, and efficient rectification against unauthorized access. The proposed framework has the potential to reduce computational overhead while increasing accuracy and speed in the cloud environment. The experimental setup for analysis demonstrates significant improvements in four key performance areas: a 0.25% increase in detection accuracy, a 0.30% reduction in rectification time, a 0.20% improvement in computational efficiency, and a 0.15% reduction in false positives. The findings indicate the efficacy of the proposed E-SDRF in addressing security challenges in dynamic and large-scale cloud computing infrastructures, rendering it highly suitable for next-generation cloud environments.
Keywords:
cloud computing security, unauthorized access detection, Elliptic Curve Digital Signature Algorithm (ECDSA), access control mechanisms, cryptographic techniques, real-time authentication, secure cloud environmentsDownloads
References
H. Eljak et al., "E-Learning-Based Cloud Computing Environment: A Systematic Review, Challenges, and Opportunities," IEEE Access, vol. 12, pp. 7329–7355, 2024. DOI: https://doi.org/10.1109/ACCESS.2023.3339250
Y. Motai, E. Henderson, N. A. Siddique, and H. Yoshida, "Cloud Colonography: Distributed Medical Testbed over Cloud," IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 495–507, Apr. 2020. DOI: https://doi.org/10.1109/TCC.2015.2481414
H. S. Kavitha, S. Mallikarjunaswamy, and N. Sharmila, "An Optimized Power Management System for Solar and Wind Energy Using Hybrid Inverters and Machine Learning," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698831
M. Goudarzi, H. Wu, M. Palaniswami, and R. Buyya, "An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments," IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1298–1311, Apr. 2021. DOI: https://doi.org/10.1109/TMC.2020.2967041
M. T. Islam, S. Karunasekera, and R. Buyya, "Performance and Cost-Efficient Spark Job Scheduling Based on Deep Reinforcement Learning in Cloud Computing Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 7, pp. 1695–1710, Jul. 2022. DOI: https://doi.org/10.1109/TPDS.2021.3124670
J. Hasenburg, M. Grambow, and D. Bermbach, "MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud," IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 58–70, Jan. 2023. DOI: https://doi.org/10.1109/TCC.2021.3074988
L. Ruan et al., "Cloud Workload Turning Points Prediction via Cloud Feature-Enhanced Deep Learning," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1719–1732, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3160228
Y.-J. Wu et al., "IoT Cloud-Edge Reconfigurable Mixed-Signal Smart Meter Platform for Arc Fault Detection," IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1682–1695, Jan. 2023. DOI: https://doi.org/10.1109/JIOT.2022.3210220
H. Zhou, Z. Zhang, D. Li, and Z. Su, "Joint Optimization of Computing Offloading and Service Caching in Edge Computing-Based Smart Grid," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1122–1132, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3163750
A. G. Putrada, M. Abdurohman, D. Perdana, and H. H. Nuha, "EdgeSL: Edge-Computing Architecture on Smart Lighting Control With Distilled KNN for Optimum Processing Time," IEEE Access, vol. 11, pp. 64697–64712, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3288425
S. Borenius, P. Kekolahti, H. Hämmäinen, M. Lehtonen, and P. Mähönen, "Novel Industry Architectures for Connectivity Solutions in the Smart Distribution Grids," IEEE Access, vol. 11, pp. 68093–68112, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3291745
S. Chen, S. Zhao, and C. Huang, "An Automatic Malaria Disease Diagnosis Framework Integrating Blockchain-Enabled Cloud–Edge Computing and Deep Learning," IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21544–21553, Dec. 2023. DOI: https://doi.org/10.1109/JIOT.2023.3304526
N. Lu, M. Liu, W. Shi, X. Liu, and K.-K. R. Choo, "SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid," IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 4162–4179, Jul. 2024. DOI: https://doi.org/10.1109/TDSC.2023.3347001
K. Wang, J. Wu, X. Zheng, J. Li, W. Yang, and A. V. Vasilakos, "Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1194–1203, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3185170
U. Khalil, Mueen-Uddin, O. A. Malik, and S. Hussain, "A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions," IEEE Access, vol. 10, pp. 76805–76823, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3189998
S. Douch, M. R. Abid, K. Zine-Dine, D. Bouzidi, and D. Benhaddou, "Edge Computing Technology Enablers: A Systematic Lecture Study," IEEE Access, vol. 10, pp. 69264–69302, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3183634
B. M. Kavya et al., "An Efficient Machine Learning-Based Power Management System for Smart Grids Using Renewable Energy Resources," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–7. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698819
M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157–3161, Aug. 2018. DOI: https://doi.org/10.48084/etasr.2101
H. S. Kavitha et al., "Optimized Crop Prediction and Monitoring Using Ensemble Machine Learning Algorithms," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698915
S. F. Issawi, A. Al Halees, and M. Radi, "An Efficient Adaptive Load Balancing Algorithm for Cloud Computing Under Bursty Workloads," Engineering, Technology & Applied Science Research, vol. 5, no. 3, pp. 795–800, Jun. 2015. DOI: https://doi.org/10.48084/etasr.554
A. C. Savitha et al., "Renewable Energy-Based Smart Agriculture Systems for Climate Change Prediction and Impact Mitigation," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–7. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698969
N. Kumar et al., "Optimal Renewable Energy Wireless Power Management System for Electric Vehicles Using Predictive Analytics," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698816
H. B. Gangadharaswamy et al., "An Efficient and Intelligent IoT-Based Security Model for Enhanced Protection Using Motion Detection and Cloud Storage Optimization," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10699278
P. S, M. S, and S. N, "Image region driven prior selection for image deblurring," Multimedia Tools and Applications, vol. 82, no. 16, pp. 24181–24202, Jul. 2023. DOI: https://doi.org/10.1007/s11042-023-14335-y
A. N. Jadagerimath, M. S, M. K. D, S. S, P. S, and S. S. Tevaramani, "A Machine Learning based Consumer Power Management System using Smart Grid," in 2023 International Conference on Recent Advances in Science and Engineering Technology, B G Nagara, India, 2023, pp. 1–5. DOI: https://doi.org/10.1109/ICRASET59632.2023.10419979
Downloads
How to Cite
License
Copyright (c) 2025 Nithyashree Basavaraju, Vasantha Kumara Mahadevachar, Mallikarjunaswamy Srikantaswamy

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
