Novel Deep Learning Framework for Automated Access Control in Cloud Computing Environments

Authors

DOI:

https://doi.org/10.59461/ijdiic.v4i3.221

Keywords:

Deep learning, Malleable Clouded Leopard-tuned Deep Recurrent Neural Network, Cloud Computing Environment, User behaviour, Access control

Abstract

The rapid adoption of Cloud Computing (CC) has significantly increased the complexity of managing secure and efficient access control due to the dynamic nature of cloud environments. Traditional methods, such as static rule-based systems or Machine Learning (ML) models, often fail to adapt to evolving user behavior and the emerging threats. To address these challenges, a novel Malleable Clouded-Leopard tuned Deep Recurrent Neural Network (MCL-DRNN) is designed for automated, real-time access control and resource allocation in CC environments. This framework utilizes cloud access logs, user behavior metrics, device identifiers, geolocation, time-stamps, and environmental variables. Preprocessing includes data cleaning, normalization, and dimensionality reduction using Principal Component Analysis (PCA) to retain critical patterns. The DRNN model is optimized using the MCL method, enabling the system to anticipate complex access patterns and detect deviations from normal behavior. By leveraging the recurrent structure of the DRNN, the system identifies subtle, persistent abnormalities indicative of potential security concerns. Performance evaluations demonstrate that the MCL-DRNN achieves 95% precision, 96% recall, and 95.6% F1-Score, outperforming traditional approaches. The intelligent, adaptive system provides a robust, self-optimizing solution for enhanced cloud security, capable of adjusting to rapidly changing cloud environments and mitigating unwanted access.

Downloads

Download data is not yet available.

References

S. Pal, A. Dorri, and R. Jurdak, “Blockchain for IoT access control: Recent trends and future research directions,” J Netw Comput Appl, vol. 203, p. 103371, Jul. 2022, doi: 10.1016/j.jnca.2022.103371.

M. Mehrtak et al., “Security challenges and solutions using healthcare cloud computing,” J Med Life, vol. 14, no. 4, pp. 448–461, Aug. 2021, doi: 10.25122/jml-2021-0100.

A. Rahman, M. J. Islam, S. S. Band, G. Muhammad, K. Hasan, and P. Tiwari, “Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT,” Digit Commun Networks, vol. 9, no. 2, pp. 411–421, Apr. 2023, doi: 10.1016/j.dcan.2022.11.003.

A. M. Tawfik, A. Al-Ahwal, A. S. T. Eldien, and H. H. Zayed, “Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey,” Cluster Comput, vol. 28, no. 8, p. 529, Sep. 2025, doi: 10.1007/s10586-025-05308-x.

S. El Kafhali, I. El Mir, and M. Hanini, “Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing,” Arch Comput Methods Eng, vol. 29, no. 1, pp. 223–246, Jan. 2022, doi: 10.1007/s11831-021-09573-y.

A. A. Abd-Aljabbar, D. A. Hammood, and L. H. Abed, "Secure Cloud Storage Using Multimodal Biometric Cryptosystem: A Deep Learning-Based Key Binding Approach," J Al-Qadisiyah Comput Sci Math, vol. 17, no. 1, Mar. 2025, doi: 10.29304/jqcsm.2025.17.11976.

R. S. K. Boddu et al., “Using deep learning to address the security issue in intelligent transportation systems,” J Auton Intell, vol. 7, no. 4, Mar. 2024, doi: 10.32629/jai.v7i4.1220.

L. Golightly, V. Chang, Q. A. Xu, X. Gao, and B. S. Liu, “Adoption of cloud computing as innovation in the organization,” Int J Eng Bus Manag, vol. 14, Nov. 2022, doi: 10.1177/18479790221093992.

M. Tahir, M. Sardaraz, Z. Mehmood, and S. Muhammad, “CryptoGA: a cryptosystem based on genetic algorithm for cloud data security,” Cluster Comput, vol. 24, no. 2, pp. 739–752, Jun. 2021, doi: 10.1007/s10586-020-03157-4.

F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, “Security by Design for Big Data Frameworks Over Cloud Computing,” IEEE Trans Eng Manag, vol. 69, no. 6, pp. 3676–3693, Dec. 2022, doi: 10.1109/TEM.2020.3045661.

V. K. Ravi and A. Ayyagari, “Data Lake Implementation in Enterprise Environments,” SSRN Electron J, 2025, doi: 10.2139/ssrn.5068537.

K. R. Bellala, “AI Driven Zero Trust Security for Hybrid Clouds,” Int J Innov Sci Res Technol, pp. 1492–1497, Apr. 2025, doi: 10.38124/ijisrt/25apr1143.

A. Singhal, P. Kumar Goel, D. Garg, and C. Sharma, “Enhancing Cloud Performance with AI-Driven Load Balancing and Optimization Algorithms,” in 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE), IEEE, Nov. 2024, pp. 1254–1259. doi: 10.1109/AECE62803.2024.10911072.

Bukunmi Temiloluwa Ofili, "Edge Computing, 5G, and Cloud Security Convergence: Strengthening USA’s Critical Infrastructure Resilience,” Int J Comput Appl Technol Res, Mar. 2025, doi: 10.7753/IJCATR1209.1003.

M. Sadaf et al., “Connected and Automated Vehicles: Infrastructure, Applications, Security, Critical Challenges, and Future Aspects,” Technologies, vol. 11, no. 5, p. 117, Sep. 2023, doi: 10.3390/technologies11050117.

U. S. Basha, “Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol,” Comput Mater Contin, vol. 79, no. 2, pp. 3397–3416, 2024, doi: 10.32604/cmc.2024.046265.

A. F. Mammo et al., “Multimodal Bio Cryptography for Securing Cloud Computing using Convolutional Neural Network,” in 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES), IEEE, Nov. 2024, pp. 1–6. doi: 10.1109/IC3TES62412.2024.10877575.

N. Mohammadi, A. Rezakhani, S. H. H. Seydjavadi, and P. Asghari, "Enhancing Time-Series Access Control Using Deep Recurrent Neural Networks and Generative Adversarial Networks," August 22, 2024. doi: 10.21203/rs.3.rs-4791025/v1.

M. Alanazi, A. Alanazi, K. M. AboRas, and Y. Y. Ghadi, "Multiobjective and Coordinated Reconfiguration and Allocation of Photovoltaic Energy Resources in Distribution Networks Using Improved Clouded Leopard Optimisation Algorithm," Int J Energy Res, vol. 2024, no. 1, Jan. 2024, doi: 10.1155/2024/7792658.

K. Thilagam et al., “Secure IoT Healthcare Architecture with Deep Learning‐Based Access Control System,” J Nanomater, vol. 2022, no. 1, Jan. 2022, doi: 10.1155/2022/2638613.

Downloads

Published

24-09-2025

How to Cite

Aditya Gupta, & Sai Kiran Oruganti. (2025). Novel Deep Learning Framework for Automated Access Control in Cloud Computing Environments. International Journal of Data Informatics and Intelligent Computing, 4(3), 41–51. https://doi.org/10.59461/ijdiic.v4i3.221

Issue

Section

Regular Issue