Journal article 472 views 190 downloads
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud
Computers, Materials & Continua, Volume: 83, Issue: 1, Pages: 719 - 738
Swansea University Author:
Cheng Cheng
-
PDF | Version of Record
© 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY).
Download (941.16KB)
DOI (Published version): 10.32604/cmc.2025.060836
Abstract
With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA...
| Published in: | Computers, Materials & Continua |
|---|---|
| ISSN: | 1546-2218 1546-2226 |
| Published: |
Tech Science Press
2025
|
| Online Access: |
Check full text
|
| URI: | https://cronfa.swan.ac.uk/Record/cronfa68957 |
| first_indexed |
2025-02-24T15:26:04Z |
|---|---|
| last_indexed |
2025-04-02T04:35:04Z |
| id |
cronfa68957 |
| recordtype |
SURis |
| fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2025-04-01T15:14:40.1878240</datestamp><bib-version>v2</bib-version><id>68957</id><entry>2025-02-24</entry><title>Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud</title><swanseaauthors><author><sid>11ddf61c123b99e59b00fa1479367582</sid><ORCID>0000-0003-0371-9646</ORCID><firstname>Cheng</firstname><surname>Cheng</surname><name>Cheng Cheng</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-02-24</date><deptcode>MACS</deptcode><abstract>With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s authenticity and secrecy. Surprisingly, the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access. Role-based access control (RBAC) implements the second strategic level, which ensures specific personnel access certain data and resources. In RBAC, each user is allowed a specific role and Permission. This implies that permitted users can access some data stored in the Cloud. This layer assists in filtering granular access to data, reducing the risk that undesired data will be discovered during the process. Layer 3 deals with intrusion detection systems (IDS), which detect and quickly deal with malicious actions and intrusion attempts. The proposed TLSA security model of e-commerce includes conventional levels of security, such as encryption and access control, and encloses an insight intrusion detection system. This method offers integrated solutions for most typical security issues of cloud computing, including data secrecy, method of access, and threats. An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method. Comparisons have been made with state-of-art techniques, including DES, RSA, and DUAL-RSA, keeping into account Accuracy, QILV, F-Measure, Sensitivity, MSE, PSNR, SSIM, and computation time, encryption time, and decryption time. The proposed TLSA method provides an accuracy of 89.23%, F-Measure of 0.876, and SSIM of 0.8564 at a computation time of 5.7 s. A comparison with existing methods shows the better performance of the proposed method, thus confirming the enhanced ability to address security issues in cloud computing.</abstract><type>Journal Article</type><journal>Computers, Materials & Continua</journal><volume>83</volume><journalNumber>1</journalNumber><paginationStart>719</paginationStart><paginationEnd>738</paginationEnd><publisher>Tech Science Press</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1546-2218</issnPrint><issnElectronic>1546-2226</issnElectronic><keywords>Cloud security: data encryption; AES; access control; intrusion detection systems (IDS); role-based access control (RBAC)</keywords><publishedDay>26</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2025</publishedYear><publishedDate>2025-03-26</publishedDate><doi>10.32604/cmc.2025.060836</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>External research funder(s) paid the OA fee (includes OA grants disbursed by the Library)</apcterm><funders>This work was supported by UKRI EPSRC Grant funded Doctoral Training Centre at Swansea University, through PhD project RS718 on Explainable AI. Authors also have been supported by UKRI EPSRC Grant EP/W020408/1 Project SPRITE+ 2: The Security, Privacy, Identity and Trust Engagement Network plus (phase 2).</funders><projectreference/><lastEdited>2025-04-01T15:14:40.1878240</lastEdited><Created>2025-02-24T15:10:17.9141986</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Tajinder</firstname><surname>Kumar</surname><order>1</order></author><author><firstname>Purushottam</firstname><surname>Sharma</surname><order>2</order></author><author><firstname>Cheng</firstname><surname>Cheng</surname><orcid>0000-0003-0371-9646</orcid><order>3</order></author><author><firstname>Sachin</firstname><surname>Lalar</surname><order>4</order></author><author><firstname>Shubham</firstname><surname>Kumar</surname><order>5</order></author><author><firstname>Sandhya</firstname><surname>Bansal</surname><order>6</order></author></authors><documents><document><filename>68957__33921__a6118f66f863426392d74dc0a2a67ac5.pdf</filename><originalFilename>68957.VOR.pdf</originalFilename><uploaded>2025-04-01T15:11:52.2604015</uploaded><type>Output</type><contentLength>963744</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY).</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
| spelling |
2025-04-01T15:14:40.1878240 v2 68957 2025-02-24 Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud 11ddf61c123b99e59b00fa1479367582 0000-0003-0371-9646 Cheng Cheng Cheng Cheng true false 2025-02-24 MACS With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s authenticity and secrecy. Surprisingly, the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access. Role-based access control (RBAC) implements the second strategic level, which ensures specific personnel access certain data and resources. In RBAC, each user is allowed a specific role and Permission. This implies that permitted users can access some data stored in the Cloud. This layer assists in filtering granular access to data, reducing the risk that undesired data will be discovered during the process. Layer 3 deals with intrusion detection systems (IDS), which detect and quickly deal with malicious actions and intrusion attempts. The proposed TLSA security model of e-commerce includes conventional levels of security, such as encryption and access control, and encloses an insight intrusion detection system. This method offers integrated solutions for most typical security issues of cloud computing, including data secrecy, method of access, and threats. An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method. Comparisons have been made with state-of-art techniques, including DES, RSA, and DUAL-RSA, keeping into account Accuracy, QILV, F-Measure, Sensitivity, MSE, PSNR, SSIM, and computation time, encryption time, and decryption time. The proposed TLSA method provides an accuracy of 89.23%, F-Measure of 0.876, and SSIM of 0.8564 at a computation time of 5.7 s. A comparison with existing methods shows the better performance of the proposed method, thus confirming the enhanced ability to address security issues in cloud computing. Journal Article Computers, Materials & Continua 83 1 719 738 Tech Science Press 1546-2218 1546-2226 Cloud security: data encryption; AES; access control; intrusion detection systems (IDS); role-based access control (RBAC) 26 3 2025 2025-03-26 10.32604/cmc.2025.060836 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University External research funder(s) paid the OA fee (includes OA grants disbursed by the Library) This work was supported by UKRI EPSRC Grant funded Doctoral Training Centre at Swansea University, through PhD project RS718 on Explainable AI. Authors also have been supported by UKRI EPSRC Grant EP/W020408/1 Project SPRITE+ 2: The Security, Privacy, Identity and Trust Engagement Network plus (phase 2). 2025-04-01T15:14:40.1878240 2025-02-24T15:10:17.9141986 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Tajinder Kumar 1 Purushottam Sharma 2 Cheng Cheng 0000-0003-0371-9646 3 Sachin Lalar 4 Shubham Kumar 5 Sandhya Bansal 6 68957__33921__a6118f66f863426392d74dc0a2a67ac5.pdf 68957.VOR.pdf 2025-04-01T15:11:52.2604015 Output 963744 application/pdf Version of Record true © 2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY). true eng https://creativecommons.org/licenses/by/4.0/ |
| title |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| spellingShingle |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud Cheng Cheng |
| title_short |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| title_full |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| title_fullStr |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| title_full_unstemmed |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| title_sort |
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud |
| author_id_str_mv |
11ddf61c123b99e59b00fa1479367582 |
| author_id_fullname_str_mv |
11ddf61c123b99e59b00fa1479367582_***_Cheng Cheng |
| author |
Cheng Cheng |
| author2 |
Tajinder Kumar Purushottam Sharma Cheng Cheng Sachin Lalar Shubham Kumar Sandhya Bansal |
| format |
Journal article |
| container_title |
Computers, Materials & Continua |
| container_volume |
83 |
| container_issue |
1 |
| container_start_page |
719 |
| publishDate |
2025 |
| institution |
Swansea University |
| issn |
1546-2218 1546-2226 |
| doi_str_mv |
10.32604/cmc.2025.060836 |
| publisher |
Tech Science Press |
| college_str |
Faculty of Science and Engineering |
| hierarchytype |
|
| hierarchy_top_id |
facultyofscienceandengineering |
| hierarchy_top_title |
Faculty of Science and Engineering |
| hierarchy_parent_id |
facultyofscienceandengineering |
| hierarchy_parent_title |
Faculty of Science and Engineering |
| department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
| document_store_str |
1 |
| active_str |
0 |
| description |
With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s authenticity and secrecy. Surprisingly, the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access. Role-based access control (RBAC) implements the second strategic level, which ensures specific personnel access certain data and resources. In RBAC, each user is allowed a specific role and Permission. This implies that permitted users can access some data stored in the Cloud. This layer assists in filtering granular access to data, reducing the risk that undesired data will be discovered during the process. Layer 3 deals with intrusion detection systems (IDS), which detect and quickly deal with malicious actions and intrusion attempts. The proposed TLSA security model of e-commerce includes conventional levels of security, such as encryption and access control, and encloses an insight intrusion detection system. This method offers integrated solutions for most typical security issues of cloud computing, including data secrecy, method of access, and threats. An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method. Comparisons have been made with state-of-art techniques, including DES, RSA, and DUAL-RSA, keeping into account Accuracy, QILV, F-Measure, Sensitivity, MSE, PSNR, SSIM, and computation time, encryption time, and decryption time. The proposed TLSA method provides an accuracy of 89.23%, F-Measure of 0.876, and SSIM of 0.8564 at a computation time of 5.7 s. A comparison with existing methods shows the better performance of the proposed method, thus confirming the enhanced ability to address security issues in cloud computing. |
| published_date |
2025-03-26T07:33:19Z |
| _version_ |
1850743350356869120 |
| score |
11.08895 |

