Home A revolutionary framework for cloud security: enhancing data protection during transmission and migration over optical networks
Article
Licensed
Unlicensed Requires Authentication

A revolutionary framework for cloud security: enhancing data protection during transmission and migration over optical networks

  • Divya Mishra , Sanjive Tyagi , Vikas Sharma EMAIL logo and Vishwas Mishra
Published/Copyright: May 22, 2025
Become an author with De Gruyter Brill

Abstract

Data protection during cloud transmission and migration is the focus of this research, which introduces a novel security architecture. This research introduces a multi-layered system that combines advanced encryption techniques, adaptive access control, and continuous security evaluations to address major shortcomings in existing security frameworks. Unlike more conventional methods, this architecture can guarantee that any data stored in the cloud will remain intact, private, and accessible at all times. Our framework significantly enhances the accuracy of threat detection, reaction time, and resource management efficiency, as shown by the comparison study with current models in simulated cloud settings. The findings highlight the system’s capacity to improve operating efficiency while reducing security risks, showing a significant improvement over traditional security procedures. Enhanced scalability and flexibility define this novel method, which is poised to revolutionize cloud data security practices in several sectors and spur more investigation into successful cloud computing security tactics.


Corresponding author: Vikas Sharma, Department of Electronics and communication engineering, Faculty of Engineering and Technology, Swami Vivekanand Subharti University, Meerut, UP, 250005, India, E-mail:

Acknowledgments

Thanks to all my co author for the support.

  1. Research ethics: Not applicable.

  2. Informed consent: We all are fully responsible for this paper.

  3. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: The author states no conflict of interest.

  6. Research funding: None declared.

  7. Data availability: Not applicable.

References

1. Shakya, S. An efficient security framework for data migration in a cloud computing environment. J Artif Intell Capsule Networks 2019. https://doi.org/10.36548/jaicn.2019.1.006.Search in Google Scholar

2. Rios, E, Iturbe, E, Larrucea, X, Rak, M, Mallouli, W, Dominiak, J, et al.. Service level agreement-based GDPR compliance and security assurance in (multi) Cloudbased systems. IET Softw 2019. https://doi.org/10.1049/iet-sen.2018.5293.Search in Google Scholar

3. Abdulghani, HA, Alexander Nijdam, N, Collen, A, Konstantas, D. A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry 2019. https://doi.org/10.3390/sym11060774.Search in Google Scholar

4. Subramanian, EK, Tamilselvan, L. A focus on future cloud: machine learning-based cloud security. Serv Oriented Comput Appl 2019;13:237–49.10.1007/s11761-019-00270-0Search in Google Scholar

5. DimitriosSikeridis, AB, Devetsikiotis, M, Reno, MJ. A blockchain-based mechanism for secure data exchange in smart grid protection systems. In: 2020 IEEE 17th annual consumer communications & networking; 2020.10.1109/CCNC46108.2020.9045368Search in Google Scholar

6. Mamidisetti, G, Ramesh Makala, CA, Anilkumar, C. A novel access control mechanism for secure cloud communication using SAML based token creation. J Ambient Intell Hum Comput 2020. https://doi.org/10.1007/s12652-020-02427-8.Search in Google Scholar

7. VishwasraoMedhane, D, Kumar Sangaiah, A, Shamim Hossain, M, Muhammad, G, Wang, J. Blockchain Enabled distributed security framework for next-generation IoT: an edge cloud and software-defined network Integrated approach. IEEE Internet Things J 2020. https://doi.org/10.1109/jiot.2020.2977196.Search in Google Scholar

8. Han, D, Wu, S, Hu, Z, Gao, H, Liu, E, Lu, Y. A novel classified ledger framework for data flow protection in AIoT networks. Secur Commun Networks 2021. https://doi.org/10.1155/2021/6671132.Search in Google Scholar

9. Abbas, A, RoobaeaAlroobaea, MK, Rubaiee, S, Vimal, S, Almansour, FM, Almansour, FM. Blockchain-assisted secured data management framework for health information analysis based on internet of medical things. Personal Ubiquitous Comput 2021. https://doi.org/10.1007/s00779-021-01583-8.Search in Google Scholar

10. Tang, X, Xu, L, Chen, G. Research on the rapid diagnostic method of rolling bearing fault based on cloud-edge collaboration. Entropy 2022. https://doi.org/10.3390/e24091277.Search in Google Scholar PubMed PubMed Central

11. Ghaiyur Hayat, F, Mithuna, BN. Applying encryption and decryption algorithm for data security in cloud. Int J Eng Res 2022. https://doi.org/10.56201/ijemt.v8.no2.2022.pg16.23.Search in Google Scholar

12. Joseph, LM, Thomson Fredrik, EJ. Ensuring the security for cloud storage data using a novel ADVP protocol by multiple auditing. Int J Health Sci 2022. https://doi.org/10.53730/ijhs.v6ns2.7561.Search in Google Scholar

13. Khanum, F, Khanum, F, R S, D, Chaithra, S. CLOUDMOAP: multilayer security by online encryption and auditing process in cloud. Indian Sci J Res Eng Manag 2023. https://doi.org/10.55041/ijsrem18704.Search in Google Scholar

14. Kumar, A. Framework for data security using DNA cryptography and HMAC technique in cloud computing. Proceedings 2021. https://doi.org/10.1109/ICESC51422.2021.9532950.Search in Google Scholar

15. Yang, Y, Chen, Y, Chen, F, Chen, J-H. Identity-based cloud storage auditing for data sharing with access control of sensitive information. IEEE Internet Things J 2022. https://doi.org/10.1109/jiot.2021.3121678.Search in Google Scholar

16. Farooqi, N, Gutub, A, Khozium, MO. Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 2019;16:11–7.Search in Google Scholar

17. Alassaf, N, Gutub, A. Simulating light-weight-cryptography implementation for IoT healthcare data security applications. Int J E Health Med Commun 2019;10:1–15. https://doi.org/10.4018/ijehmc.2019100101.Search in Google Scholar

18. Singh, A, Gutub, A, Nayyar, A, Khurram, M. Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multimed Tool Appl 2023;82:21243–77. https://doi.org/10.1007/s11042-022-12468-7.Search in Google Scholar

19. Al-Shaarani, F, Gutub, A. Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ Comput Inf Sci 2021. https://doi.org/10.1016/j.jksuci.2020.10.008.Search in Google Scholar

20. Sahu, AK, Gutub, A. Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tool Appl 2022. https://doi.org/10.1007/s11042-021-12054-6.Search in Google Scholar

21. NafisahKheshaifaty, AG. Engineering graphical captcha and AES crypto hash functions for secure online authentication. Int J Eng Res 2021. https://doi.org/10.36909/jer.v9iS1.9311.Search in Google Scholar

22. Gutub, A, Kheshaifaty, N. Practicality analysis of utilizing text-based CAPTCHA vs. graphic-based CAPTCHA authentication. Multimed Tool Appl 2023;82:46577–609. https://doi.org/10.1007/s11042022-13801-7.Search in Google Scholar

23. Alotaibi, M, Al-hendi, D, Alroithy, B, AlGhamdi, M, Gutub, A. Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrimes Res 2019;2:73–82. https://doi.org/10.26735/16587790.2019.001.Search in Google Scholar

24. Samkari, H, Gutub, A. Cybercrimes within Hajj period by 3-layer security. Recent Trends Inf Technol Appl 2019;2:1–21.Search in Google Scholar

25. Kumar Roy, P, Saumya, S, Singh, JP, Banerjee, S, Gutub, A. Analysis of community question-answering issues via machine learning and deep learning: state-of-the-art review. CAAI Transactions Intell Technol 2023;8:95–117. https://doi.org/10.1049/cit2.12135.Search in Google Scholar

26. Sufi, FK, Alsulami, M, Gutub, A. Automating global threat-maps generation via advancements of news sensors and AI. Arabian J Sci Eng 2023;48:2455–72. https://doi.org/10.1007/s13369022-07254-5.Search in Google Scholar

27. Altalhi, S, Gutub, A. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Hum Comput 2021;12:10209–21. https://doi.org/10.1007/s12652-02002768-y.Search in Google Scholar

28. Singh, A, Chandra Satapathy, S, Roy, A, Gutub, A. AI based mobile edge computing for IoT: applications, challenges, and future scope. Arabian J Sci Eng 2022. https://doi.org/10.1007/s13369021-05961-5.Search in Google Scholar

29. Shambour, MKYM, Gutub, A, Abu-Hashem, MA. Personal privacy evaluation of smart devices applications serving Hajj and Umrah rituals. Int J Eng Res 2023. https://doi.org/10.36909/jer.v11i3.1167.Search in Google Scholar

30. Alsaidi, A, Gutub, A, Alkhodaid, T. Cybercrime on transportation airline. J Forensic Res 2019;10:449.Search in Google Scholar

31. Al-Shaarani, F, Basakran, N, Gutub, A. Sensing e-banking cybercrimes vulnerabilities via smart information sciences strategies. RAS Eng Technol 2020;1:1–9.Search in Google Scholar


Supplementary Material

This article contains supplementary material (https://doi.org/10.1515/joc-2025-0158).


Received: 2025-04-23
Accepted: 2025-04-29
Published Online: 2025-05-22

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 9.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/joc-2025-0158/html
Scroll to top button