A Cloud Environment Security Access Control Scheme Based on Federated Learning and Fuzzy Logic Integration

Authors

DOI:

https://doi.org/10.4108/eetsis.11731

Abstract

In cloud environments, the coexistence of multi-source heterogeneous nodes, cross-domain data sharing, and dynamic access control requirements are mutually intertwined. The lack of capability to address dynamic node risks and differentiated access demands necessitates a solution to these challenges. To this end, a cloud environment security access control scheme integrating federated learning and fuzzy logic is proposed. Firstly, using fuzzy logic to quantitatively evaluate the multidimensional dynamic attributes of nodes in the cloud environment, the results serve as a prerequisite for selecting participating nodes in federated learning; Secondly, a blockchain based federated learning architecture is constructed, and a ciphertext policy attribute based encryption algorithm is introduced to deeply couple access control policies with the federated learning process, achieving fine-grained control where only authorized nodes can participate in model aggregation and decryption. Experimental results demonstrate that this control scheme effectively evaluates the security state of the cloud environment, identifies and defends against multiple attack behaviours, achieves precise permission control for users of varying identities, and ensures the security, reliability, and dynamic adaptability of access control within the cloud environment.

 

References

[1] Sharma N, Saharia M. ML-cascade: a machine learning and cloud computing-based tool for rapid and automated mapping of landslides using earth observation data. Landslides. 2025; 22(1):31-43.

[2] Gazis A, Katsiri E. Streamline intelligent crowd monitoring with IoT cloud computing middleware. Sensors. 2024; 24(11):3643-3665.

[3] Bari MF, Chowdhury MR, Sen S. A computational harmonic detection algorithm to detect data leakage through EM emanation. IEEE Internet Things J. 2025; 12(16):32916-32931.

[4] Jayasundara SH, Arachchilage NAG, Russello G. SoK: access control policy generation from high-level natural language requirements. ACM Comput Surv. 2025; 57(4):1-37.

[5] Kaya TT, Yalcin E, Kaleli C. A novel classification-based shilling attack detection approach for multi-criteria recommender systems. Comput Intell. 2023; 39(3):499-528.

[6] Mousa K, Zhang Z, Sumarliah E, Hamdan IKA. The impact of cloud computing adoption on firm performance among SMEs in Palestine: a machine learning approach. Int J Intell Inf Technol. 2024; 20(20):1-24.

[7] Fuente-Anaya HADL, Marin-Castro HM, Garcia-Hernandez JJ. Business process discovery as a service with event log privacy and access control over discovered models. Computing. 2024; 106(11):3603-3625.

[8] Hmidi Z, Kahloul L, Benharzallah S. A new mobility and energy harvesting aware medium access control (MEH-MAC) protocol: modelling and performance evaluation. Ad Hoc Netw. 2023; 142(4):103108.

[9] Karim M, Rahman MA, Atiquzzaman M. Hybrid medium access control strategy for Internet-of-Things-enabled intravehicular health monitoring system. IEEE Internet Things J. 2025; 12(4):3846-3857.

[10] Raj A, Prakash S. An efficient blockchain-based access control framework for IoT-healthcare system. Wirel Pers Commun. 2024; 136(2):1017-1045.

[11] Singh MP, Sural S, Vaidya J, Atluri V. A role-based administrative model for administration of heterogeneous access control policies and its security analysis. Inf Syst Front. 2024; 26(6):2255-2272.

[12] Lauer H, Rudolph C, Grobler M, Shahraki AS, Sakzad A. Access control, key management, and trust for emerging wireless body area networks. Sensors. 2023; 23(24):9856.

[13] Otieno SO, Wambua JM, Mwema FM, Mharakurwa ET, Jen TC, Akinlabi ET. A predictive modelling strategy for warpage and shrinkage defects in plastic injection molding using fuzzy logic and pattern search optimization. J Intell Manuf. 2025; 36(3):1835-1859.

[14] Korenevskiy NA, Al-Kasasbeh RT, AshrafShaqadan, Al-Habahbeh OM, AhmadTelfah, Mousa MS, Rodionova S, Filist S, Al-Kassasbeh ET, Krutskikh V, Shalimova E, Aikeyeva AA, Ilyash M. Computerized decision support system and fuzzy logic rules for early diagnosis of pesticide-induced diseases. Crit Rev Biomed Eng. 2025; 53(1):1-22.

[15] Enaya YA, Karim AA, Saleh SM, Shneen SW. Adapting wired TCP for wireless ad-hoc networks using fuzzy logic control. J Eur Syst Autom. 2024; 57(5):1377-1386.

[16] Araz OU, Ilgin MA, Eski O, Araz C. Fuzzy demand-driven material requirements planning: a comprehensive analysis of fuzzy logic implementation in DDMRP. Int J Prod Res. 2024; 62(21):7793-7811.

[17] Nakai-Kasai A, Wadayama T. Regular section deep unfolding-based weighted averaging for federated learning under device and statistical heterogeneous environments. IEICE Trans Commun. 2025; 108(4):411-420.

[18] Dao MC, Nguyen PL, Pham HH, Nguyen TH, Chen P, Wahib M, Truong TN. Noisy data-based attack: a new type of untargeted attack in federated learning and its countermeasures. Future Gener Comput Syst. 2025; 173(12):107900.

[19] Ferretti S, Cassano L, Cialone G, D'Abramo J, Imboccioli F. Decentralized coordination for resilient federated learning: a blockchain-based approach with smart contracts and decentralized storage. Comput Commun. 2025; 236(4):108112.

[20] Alebouyeh Z, Bidgoly AJ. Privacy-preserving federated learning compatible with robust aggregators. Eng Appl Artif Intell. 2025; 143(3):110078.

[21] Gurung D, Pokhrel SR. Chained continuous quantum federated learning framework. Future Gener Comput Syst. 2025; 169(8):107800.

[22] Barbieri L, Kianoush S, Nicoli M, Serio L, Savazzi S. A close look at the communication efficiency and the energy footprints of robust federated learning in industrial IoT. IEEE Internet Things J. 2025; 12(11):15130-15150.

[23] Ferrer-Rojas A, Maharaj BTJ. Multiauthority KP-ABE access model with elliptic curve cryptography. SAIEE Afr Res J. 2025; 116(2):59-67.

[24] Sravanthi K, Chandrasekhar P. An efficient multi-user groupwise integrity CP-ABE (GI-CPABE) for homogeneous and heterogeneous cloud blockchain transactions. J Electr Syst. 2024; 20(1):326-349.

Downloads

Published

29-04-2026

Issue

Section

Data Security and Privacy Protection in New Distributed Networks and System

How to Cite

1.
Li H. A Cloud Environment Security Access Control Scheme Based on Federated Learning and Fuzzy Logic Integration. EAI Endorsed Scal Inf Syst [Internet]. 2026 Apr. 29 [cited 2026 Apr. 29];12(9). Available from: https://publications.eai.eu/index.php/sis/article/view/11731