encryption plays a crucial role in cloud security.
Gentry (2009) introduced fully homomorphic
encryption (FHE), enabling computations on
encrypted data without decryption, ensuring privacy
even when data is processed in untrusted
environments.
Cloud computing security risks have been
extensively studied. NIST (2011) provided guidelines
for securing public cloud environments, emphasizing
the importance of encryption and identity
management. Kandukuri and Rakshit (2009)
highlighted security challenges in cloud computing,
addressing issues such as data privacy, unauthorized
access, and service availability.
To enhance fairness and security in secret sharing
schemes, Yi Sun et al. (2016) proposed a completely
fair secret sharing model without the need for a
trusted dealer. Their approach reduces the risks of
insider threats and unauthorized key recovery.
Modern cloud security frameworks integrate
Identity and Access Management (IAM), Multi-
Factor Authentication (MFA), and secret sharing
techniques to strengthen data privacy. Xiong et al.
(2020) explored privacy-preserving computation
using additive secret sharing, while Loruenser et al.
(2015) introduced secure cloud-based data sharing
mechanisms. These advancements reinforce
resilience against cyber threats and improve
compliance with regulatory standards.
3 RESEARCH GAP ANALYSIS
Cloud security continues to evolve, addressing
challenges related to data confidentiality and access
control. Despite advancements, existing security
models still face limitations that necessitate a two-
level security approach integrating advanced
cryptographic methods and AI- driven anomaly
detection. Identity and Access Management (IAM)
systems are essential for authentication and
authorization but have several weaknesses, including
static role-based access control (RBAC), which lacks
flexibility in dynamic environments, single-factor
authentication vulnerabilities, and scalability issues
in multi-cloud infrastructures. Multi-Factor
Authentication (MFA) enhances security, yet
challenges such as user experience trade-offs, device
dependency risks, and attack techniques like social
engineering and SIM swapping highlight the need for
adaptive authentication measures. In key
management, Shamir’s Secret Sharing (SSS), while
widely used, introduces computational overhead,
complexity in reconstruction, and limitations when
relying solely on polynomial interpolation
techniques. Security threats in cloud storage and data
transmission persist due to reactive rather than
proactive intrusion detection, inadequate encryption
standards, and limited AI integration in threat
detection systems. Compliance with regulatory
frameworks like GDPR and HIPAA poses additional
challenges, particularly cross-border data privacy
conflicts, manual compliance audits prone to errors,
and concerns regarding legal and ethical security
enforcement. To address these issues, a two-level
security model is proposed, incorporating adaptive
IAM policies and biometric-enhanced MFA for
authentication, a hybrid secret-sharing approach to
optimize key management, AI-driven threat detection
using deep learning models for real-time security
monitoring, and automated compliance verification
tools to align with international security standards.
By integrating these advancements, the system
enhances cloud security resilience, mitigates evolving
cyber threats, and ensures regulatory adherence while
maintaining usability and performance.
4 PROPOSED SOLUTION
The proposed system strengthens cloud security by
implementing a two-level security framework that
integrates advanced authentication, robust key
management, and crypto- graphic techniques to
ensure secure access and data protection. The
approach minimizes the risk of unauthorized access,
key exposure, and regulatory non-compliance,
providing a scalable and efficient security solution.
A refined Identity and Access Management (IAM)
framework is implemented to control access at a
granular level. The system ensures that user roles and
permissions are assigned based on responsibilities
and security policies, preventing unauthorized access
to sensitive data and operations.
To provide stronger authentication, the system
integrates biometric verification (such as fingerprint
or iris scanning) alongside hardware tokens that
generate temporary access codes. This multi-layered
authentication approach significantly reduces the risk
of credential theft, phishing, and brute-force attacks.
To protect encryption keys from unauthorized access,
the system incorporates Shamir’s Secret Sharing
Scheme (SSS). This method divides an encryption
key into multiple shares, ensuring that only a
predefined number of shares can be combined to
reconstruct the original key, preventing single-point
key exposure. Polynomial interpolation (Lagrange
interpolation) is used as part of this scheme,