An Enhanced Secure Framework for Detecting and Rectifying Unauthorized Access in Cloud Computing Environments Using the Elliptic Curve Digital Signature Algorithm

Authors

  • Nithyashree Basavaraju Department of Computer Science and Engineering, Government Polytechnic, Ramanagara, India
  • Vasantha Kumara Mahadevachar Department of Computer Science and Engineering, Government Engineering College, Hassan, India
  • Mallikarjunaswamy Srikantaswamy Department of Electronics and Communication Engineering, JSS Academy of Technical Education, Bengaluru, India
Volume: 15 | Issue: 4 | Pages: 24188-24195 | August 2025 | https://doi.org/10.48084/etasr.9764

Abstract

While cloud computing environments offer significant advantages, they also pose serious security challenges, especially in the detection and rectification of unauthorized access. Traditional methods, including Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Advanced Encryption Standard (AES), are widely used but suffer from a number of drawbacks, including high computational cost, scalability issues, and vulnerability to modern cyber-attacks. This reduces their effectiveness in ensuring real-time security and efficient access management in cloud systems. The aforementioned limitations are addressed by the proposed Enhanced Secure Detection and Rectification Framework (E-SDRF), which is based on the Elliptic Curve Digital Signature Algorithm (ECDSA) method. By employing this method, cloud security is enhanced through the implementation of more robust authentication, faster detection, and efficient rectification against unauthorized access. The proposed framework has the potential to reduce computational overhead while increasing accuracy and speed in the cloud environment. The experimental setup for analysis demonstrates significant improvements in four key performance areas: a 0.25% increase in detection accuracy, a 0.30% reduction in rectification time, a 0.20% improvement in computational efficiency, and a 0.15% reduction in false positives. The findings indicate the efficacy of the proposed E-SDRF in addressing security challenges in dynamic and large-scale cloud computing infrastructures, rendering it highly suitable for next-generation cloud environments.

Keywords:

cloud computing security, unauthorized access detection, Elliptic Curve Digital Signature Algorithm (ECDSA), access control mechanisms, cryptographic techniques, real-time authentication, secure cloud environments

Downloads

Download data is not yet available.

References

H. Eljak et al., "E-Learning-Based Cloud Computing Environment: A Systematic Review, Challenges, and Opportunities," IEEE Access, vol. 12, pp. 7329–7355, 2024. DOI: https://doi.org/10.1109/ACCESS.2023.3339250

Y. Motai, E. Henderson, N. A. Siddique, and H. Yoshida, "Cloud Colonography: Distributed Medical Testbed over Cloud," IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 495–507, Apr. 2020. DOI: https://doi.org/10.1109/TCC.2015.2481414

H. S. Kavitha, S. Mallikarjunaswamy, and N. Sharmila, "An Optimized Power Management System for Solar and Wind Energy Using Hybrid Inverters and Machine Learning," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698831

M. Goudarzi, H. Wu, M. Palaniswami, and R. Buyya, "An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments," IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1298–1311, Apr. 2021. DOI: https://doi.org/10.1109/TMC.2020.2967041

M. T. Islam, S. Karunasekera, and R. Buyya, "Performance and Cost-Efficient Spark Job Scheduling Based on Deep Reinforcement Learning in Cloud Computing Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 7, pp. 1695–1710, Jul. 2022. DOI: https://doi.org/10.1109/TPDS.2021.3124670

J. Hasenburg, M. Grambow, and D. Bermbach, "MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud," IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 58–70, Jan. 2023. DOI: https://doi.org/10.1109/TCC.2021.3074988

L. Ruan et al., "Cloud Workload Turning Points Prediction via Cloud Feature-Enhanced Deep Learning," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1719–1732, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3160228

Y.-J. Wu et al., "IoT Cloud-Edge Reconfigurable Mixed-Signal Smart Meter Platform for Arc Fault Detection," IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1682–1695, Jan. 2023. DOI: https://doi.org/10.1109/JIOT.2022.3210220

H. Zhou, Z. Zhang, D. Li, and Z. Su, "Joint Optimization of Computing Offloading and Service Caching in Edge Computing-Based Smart Grid," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1122–1132, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3163750

A. G. Putrada, M. Abdurohman, D. Perdana, and H. H. Nuha, "EdgeSL: Edge-Computing Architecture on Smart Lighting Control With Distilled KNN for Optimum Processing Time," IEEE Access, vol. 11, pp. 64697–64712, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3288425

S. Borenius, P. Kekolahti, H. Hämmäinen, M. Lehtonen, and P. Mähönen, "Novel Industry Architectures for Connectivity Solutions in the Smart Distribution Grids," IEEE Access, vol. 11, pp. 68093–68112, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3291745

S. Chen, S. Zhao, and C. Huang, "An Automatic Malaria Disease Diagnosis Framework Integrating Blockchain-Enabled Cloud–Edge Computing and Deep Learning," IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21544–21553, Dec. 2023. DOI: https://doi.org/10.1109/JIOT.2023.3304526

N. Lu, M. Liu, W. Shi, X. Liu, and K.-K. R. Choo, "SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid," IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 4162–4179, Jul. 2024. DOI: https://doi.org/10.1109/TDSC.2023.3347001

K. Wang, J. Wu, X. Zheng, J. Li, W. Yang, and A. V. Vasilakos, "Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1194–1203, Apr. 2023. DOI: https://doi.org/10.1109/TCC.2022.3185170

U. Khalil, Mueen-Uddin, O. A. Malik, and S. Hussain, "A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions," IEEE Access, vol. 10, pp. 76805–76823, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3189998

S. Douch, M. R. Abid, K. Zine-Dine, D. Bouzidi, and D. Benhaddou, "Edge Computing Technology Enablers: A Systematic Lecture Study," IEEE Access, vol. 10, pp. 69264–69302, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3183634

B. M. Kavya et al., "An Efficient Machine Learning-Based Power Management System for Smart Grids Using Renewable Energy Resources," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–7. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698819

M. Ramzan, M. S. Farooq, A. Zamir, W. Akhtar, M. Ilyas, and H. U. Khan, "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries," Engineering, Technology & Applied Science Research, vol. 8, no. 4, pp. 3157–3161, Aug. 2018. DOI: https://doi.org/10.48084/etasr.2101

H. S. Kavitha et al., "Optimized Crop Prediction and Monitoring Using Ensemble Machine Learning Algorithms," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698915

S. F. Issawi, A. Al Halees, and M. Radi, "An Efficient Adaptive Load Balancing Algorithm for Cloud Computing Under Bursty Workloads," Engineering, Technology & Applied Science Research, vol. 5, no. 3, pp. 795–800, Jun. 2015. DOI: https://doi.org/10.48084/etasr.554

A. C. Savitha et al., "Renewable Energy-Based Smart Agriculture Systems for Climate Change Prediction and Impact Mitigation," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–7. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698969

N. Kumar et al., "Optimal Renewable Energy Wireless Power Management System for Electric Vehicles Using Predictive Analytics," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10698816

H. B. Gangadharaswamy et al., "An Efficient and Intelligent IoT-Based Security Model for Enhanced Protection Using Motion Detection and Cloud Storage Optimization," in 2024 Second International Conference on Networks, Multimedia and Information Technology, Bengaluru, India, 2024, pp. 1–6. DOI: https://doi.org/10.1109/NMITCON62075.2024.10699278

P. S, M. S, and S. N, "Image region driven prior selection for image deblurring," Multimedia Tools and Applications, vol. 82, no. 16, pp. 24181–24202, Jul. 2023. DOI: https://doi.org/10.1007/s11042-023-14335-y

A. N. Jadagerimath, M. S, M. K. D, S. S, P. S, and S. S. Tevaramani, "A Machine Learning based Consumer Power Management System using Smart Grid," in 2023 International Conference on Recent Advances in Science and Engineering Technology, B G Nagara, India, 2023, pp. 1–5. DOI: https://doi.org/10.1109/ICRASET59632.2023.10419979

Downloads

How to Cite

[1]
N. Basavaraju, V. K. Mahadevachar, and M. Srikantaswamy, “An Enhanced Secure Framework for Detecting and Rectifying Unauthorized Access in Cloud Computing Environments Using the Elliptic Curve Digital Signature Algorithm”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 24188–24195, Aug. 2025.

Metrics

Abstract Views: 198
PDF Downloads: 277

Metrics Information