Details



Adaptive Zero-Trust Cloud Security Using AI-Driven Contextual Ensemble Frameworks

Farah Faleh Alu

1-12

Vol 22, Issue 1, Jul-Dec, 2025

Date of Submission: 2025-05-17 Date of Acceptance: 2025-07-12 Date of Publication: 2025-08-04

Abstract

The fast growing popularity of cloud computing within enterprise and critical infrastructure settings has increased the need to develop secure, adaptive and intelligent mechanisms of access control. The traditional and more static and role-deterministic approaches are becoming less useful in managing dynamically variable and contextual security needs. This paper develops an AI-enhanced secure access control model which incorporates both context-aware characteristics and ensemble learning to improve cloud security. The system is able to adaptively analyse user actions and the context of the environment and the sensitivity of the resources through a system of machine learning classifiers in an ensemble methodology, providing high accuracy and noise tolerance. Based on experimental verifications, the model suggests it will be useful in cloud access governance due to its better performance in detecting malicious servers, a low latency, and high resistance to adversarial threats than conventional approaches, which provides a solid base to scale and resilience cloud access governance.

References

  1. Aaker, D. A. (1991). Managing brand equity: Capitalizing on the value of a brand name. Free Press.
  2. AjuniorVC. (2024). Is Cafe Coffee Day's rollercoaster on a 5,000 Cr turnaround? Retrieved from https://www.ajuniorvc.com/ccd-cafe-coffee-day-case-study-turnaround-startup-market
  3. Ahmed, A. A. (2025). Adaptive machine learning frameworks for real-time threat detection in cloud environments. International Journal of Multidisciplinary Research and Growth Evaluation, *6*(4), 223– 229. https://doi.org/10.54660/IJMRGE.2025.6.4.223-229
  4. Ahmed, A. A., Al-Sharhanee, K. A. M., Najim, A. H., Alheeti, K. M. A., Satar, N. S. M., & Hashim, A. H. A. (2024). Efficient UAV routing strategies for wireless sensor network data retrieval. 2024 5th International Conference on Data Science and Applications (DASA). IEEE. https://doi.org/10.1109/DASA63652.2024.10836526
  5. Ahmed, A. A., Fadhil, S. A., Najim, A. H., Alheeti, K. M. A., Satar, N. S. M., & Hashim, A. H. A. (2024). Assessing the effects of blackhole attacks on MANET reliability and security. 2024 5th International Conference on Data Science and Applications (DASA). IEEE. https://doi.org/10.1109/DASA63652.2024.10836645
  6. Ahmed, A. A., Ibrahim, H. S., Shakir, I. A., Abdulkadir, R. A., Akinlawon, A. A., & Alhassan, M. (2025). The role of deep learning in enhancing solar panel efficiency: A review of models and metrics. Cybersystems Journal, *2*(1), 1–9. https://doi.org/10.57238/csj.2025.1001
  7. Al-Dubai, A., Khan, M., & Hussein, M. (2023). Context-aware access control in zero-trust architectures for multicloud systems. ResearchGate Preprint.
  8. Alsadie, D. (2024). Artificial intelligence techniques for securing fog computing environments: Trends, challenges, and future directions. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3403456
  9. Bhattacharya, A., Basu, S., & Roy, S. (2021). RASA: Risk-aware smart authorization in cyber-physical healthcare systems using unsupervised learning. arXiv preprint arXiv:2108.12739.
  10. Business Park Center. (2024). Cafe Coffee Day business model: How does Cafe Coffee Day earn profit? Retrieved from https://www.businessparkcenter.com/cafe-coffee-day-business-model/
  11. Business Park Center. (2024). SWOT analysis of Café Coffee Day (CCD) in 2024. Retrieved from https://www.businessparkcenter.com/swot-analysis-of-cafe-coffee-day/
  12. Business Today. (2023). Customer satisfaction survey: Insights into Cafe Coffee Day. Retrieved from https://www.businesstoday.in/latest/in-focus/story/customer-satisfaction-survey-insights-into-cafe-coffee-day378234-2023-05-15
  13. Digitofy. (2024). Cafe Coffee Day marketing strategy. Retrieved from https://digitofy.com/blog/cafe-coffee-daymarketing-strategy/
  14. Digitofy. (2024). How Cafe Coffee Day brewed its marketing strategy to perfection. Retrieved from https://digitofy.com/blog/cafe-coffee-day-marketing-strategy/
  15. Economic Times. (2021). Debt reduced significantly; management working on bringing firm back on track. Retrieved from https://economictimes.indiatimes.com/industry/cons-products/food/debt-reduced-significantly-managementworking-on-bringing-firm-back-on-track-coffee-day-enterprises/articleshow/85693213.cms
  16. FasterCapital. (2024). Brand decline: Brand erosion: Why some companies lose their luster. Retrieved from https://fastercapital.com/content/Brand-Decline--Brand-Erosion--Why-Some-Companies-Lose-TheirLuster.html
  17. Finology Insider. (2024). The rise, fall, and revival of Cafe Coffee Day: A debt story. Retrieved from https://insider.finology.in/entrepreneurship/cafe-coffee-day-debt
  18. Gujar, S. S. (2024). Exploring device fingerprinting for password-less authentication systems. 2024 Global Conference on Communications and Information Technologies (GCCIT) (pp. 1–7). IEEE. https://doi.org/10.1109/GCCIT63234.2024.10862062
  19. Hassan, M., & Ali, T. (2025). Semantic-enabled context-aware services in cloud and mobile computing. Journal of Cloud Computing: Advances, Systems and Applications, *14*(12), 1–18. https://doi.org/10.1186/s13677-025-0050-1
  20. HubSpot. (2024). The impact of brand perception on consumer behavior. Retrieved from https://blog.hubspot.com/service/consumer-behavior-model
  21. Jameel, S., Shabir, M., & Rasool, S. (2022). A risk-adaptive access control model for cloud and IoT applications. Mathematics, *12*(16), 2541. https://doi.org/10.3390/math12162541
  22. Karamchand, G. (2025). AI-optimized network function virtualization security in cloud infrastructure. International Journal of Humanities and Information Technology, *7*(3), 1–12.
  23. Kotler, P., & Keller, K. L. (2016). Marketing management (15th ed.). Pearson Education.
  24. Kumar, A., & Ramesh, D. (2024). Secure cloud access management: Enhancing flexibility with ABAC and containerized policies. AIP Conference Proceedings, *3162*(1), 020107. https://doi.org/10.1063/5.0212345
  25. Marketing Monk. (2024). CCD v/s Third Wave Coffee – Same industry, different marketing strategies. Retrieved from https://www.marketingmonk.so/p/ccd-v-s-third-wave-coffee-same-industry-different-marketing-strategies
  26. Marketing91. (n.d.). Impact of negative publicity on brand loyalty. Retrieved from https://www.marketing91.com/impact-of-negative-publicity-on-brand-loyalty/
  27. Marketfeed. (2022). The rise, fall, and revival of Cafe Coffee Day. Retrieved from https://www.marketfeed.com/read/en/the-rise-fall-and-revival-of-cafe-coffee-day-ccd
  28. Muhsen, D. K., Khmas, B. F., Ahmed, A. A., & Sadiq Al-Obaidi, A. T. (2025). Comparative analysis of machine learning models for predictive healthcare in chronic disease management. Journal of Intelligent Systems and Internet of Things, *17*(2), 36–49. https://doi.org/10.54216/JISIoT.170204
  29. Mutasharand, H. J., Muhammed, A. A., & Ahmed, A. A. (2024). Design of deep learning methodology. In P. K. Gupta, D. Gupta, & A. Khanna (Eds.), Proceedings of Third International Conference on Computing and Communication Networks: ICCCN 2023 (Vol. 2, pp. 207–215). Springer Nature. https://doi.org/10.1007/978-981-97- 0324-2_17
  30. Nagarajan, S. K., et al. (2025). Enhanced anomaly detection in embedded payment systems using depthwise separable CNN with dandelion optimizer. 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE.
  31. Osum. (2024). Brand challenge: The role of value perception in overcoming declining consumer sentiment. Retrieved from https://go-upland.com/the-role-of-value-perception-in-overcoming-declining-consumer-sentiment/
  32. Singh, R., Yadav, A., & Verma, R. (2022). Machine learning approaches for cloud access security brokers: A comprehensive survey. Artificial Intelligence Review. Springer. https://doi.org/10.1007/s10462-022-10207-3
  33. Singh, R., Yadav, A., & Verma, R. (2024). Machine learning in cloud security: Role of CASBs and adaptive risk control. Artificial Intelligence Review. Springer. https://doi.org/10.1007/s10462-024-10744-1
  34. SSRN. (2022). The turnaround of Café Coffee Day: A case study. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4262623
  35. Stutz, D., et al. (2024). Enhancing security in cloud computing using artificial intelligence (AI). In Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection (pp. 179–220).
  36. Sun, Q., & Chen, Y. (2025). Policy synthesis for access control using large language models. arXiv preprint arXiv:2503.11573.
  37. The Big Marketing. (2024). Cafe Coffee Day marketing strategy 2024: A case study. Retrieved from https://thebigmarketing.com/cafe-coffee-day-marketing-strategy/
  38. Unstop. (2024). Malavika Hegde: Grieving widow; CEO of CCD brings debt of ₹7,200 Cr down to ₹1,731 Cr. Retrieved from https://unstop.com/blog/malavika-hegde-ceo-of-ccd
  39. Upland. (2024). Continuing economic pressures and erosion of confidence. Retrieved from https://goupland.com/the-role-of-value-perception-in-overcoming-declining-consumer-sentiment/
  40. Vizologi. (2018). Café Coffee Day business model canvas. Retrieved from https://vizologi.com/business-strategycanvas/cafe-coffee-day-business-model-canvas/
  41. Wiser Retail Strategies. (2024). Brand erosion: Its causes and how to prevent it. Retrieved from https://blog.wiser.com/brand-erosion-its-causes-and-how-to-prevent-it/
  42. World Bank. (2021). Urban population (% of total population) – India. Retrieved from https://data.worldbank.org/indicator/SP.URB.TOTL.IN.ZS?locations=IN
  43. World Coffee Portal. (2024). India's Café Coffee Day posts strong revenue growth. Retrieved from https://www.worldcoffeeportal.com/Latest/News/2024/September/India-s-Cafe-Coffee-Day-posts-strongrevenue-growt
  44. Yu, Z., Zhang, P., & Ma, X. (2025). Zero-trust identity and fine-grained access control for agentic AI systems. arXiv preprint arXiv:2505.19301.
Download PDF
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Innovations in Scientific Engineering does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.

s