Open Access iconOpen Access

ARTICLE

Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

1 Computer Science & Engineering Department, Jai Parkash Mukand Lal Innovative Engineering & Technology Institute, Radaur, 135133, Haryana, India
2 School of Computer Science & Engineering, Galgotias University, Greater Noida, 203201, Uttar Pradesh, India
3 Computer Science Department, Bay Campus Fabian Way, Swansea University, Swansea, SA1 8EN, UK
4 Department of Engineering and Technology, Gurugram University, Gurugram, 122003, India
5 Presidency School of Computer Science, Presidency University, Bangalore, 560089, India
6 Maharishi Markendeshwar Engineering College, Maharishi Markandeshwar (Deemed to be) University, Mullana, Ambala, 133203, India

* Corresponding Authors: Purushottam Sharma. Email: email; Xiaochun Cheng. Email: email

Computers, Materials & Continua 2025, 83(1), 719-738. https://doi.org/10.32604/cmc.2025.060836

Abstract

With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s authenticity and secrecy. Surprisingly, the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access. Role-based access control (RBAC) implements the second strategic level, which ensures specific personnel access certain data and resources. In RBAC, each user is allowed a specific role and Permission. This implies that permitted users can access some data stored in the Cloud. This layer assists in filtering granular access to data, reducing the risk that undesired data will be discovered during the process. Layer 3 deals with intrusion detection systems (IDS), which detect and quickly deal with malicious actions and intrusion attempts. The proposed TLSA security model of e-commerce includes conventional levels of security, such as encryption and access control, and encloses an insight intrusion detection system. This method offers integrated solutions for most typical security issues of cloud computing, including data secrecy, method of access, and threats. An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method. Comparisons have been made with state-of-art techniques, including DES, RSA, and DUAL-RSA, keeping into account Accuracy, QILV, F-Measure, Sensitivity, MSE, PSNR, SSIM, and computation time, encryption time, and decryption time. The proposed TLSA method provides an accuracy of 89.23%, F-Measure of 0.876, and SSIM of 0.8564 at a computation time of 5.7 s. A comparison with existing methods shows the better performance of the proposed method, thus confirming the enhanced ability to address security issues in cloud computing.

Keywords

Cloud security: data encryption; AES; access control; intrusion detection systems (IDS); role-based access control (RBAC)

Cite This Article

APA Style
Kumar, T., Sharma, P., Cheng, X., Lalar, S., Kumar, S. et al. (2025). Enhanced triple layered approach for mitigating security risks in cloud. Computers, Materials & Continua, 83(1), 719–738. https://doi.org/10.32604/cmc.2025.060836
Vancouver Style
Kumar T, Sharma P, Cheng X, Lalar S, Kumar S, Bansal S. Enhanced triple layered approach for mitigating security risks in cloud. Comput Mater Contin. 2025;83(1):719–738. https://doi.org/10.32604/cmc.2025.060836
IEEE Style
T. Kumar, P. Sharma, X. Cheng, S. Lalar, S. Kumar, and S. Bansal, “Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud,” Comput. Mater. Contin., vol. 83, no. 1, pp. 719–738, 2025. https://doi.org/10.32604/cmc.2025.060836



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 117

    View

  • 48

    Download

  • 0

    Like

Share Link