Journal of Intelligent Systems and Internet of Things JISIoT 2690-6791 2769-786X 10.54216/JISIoT https://www.americaspg.com/journals/show/2710 2019 2019 A Hybrid Logistic Scroll Chaotic Encryption Algorithm for Ensuring the Cloud Security to Counerfeiting the Attacks Department of Computer Science and Engineering, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India Madireddy Madireddy Department of Computer Science and Engineering, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India Kalaivani Kathirvelu Cloud computing is meant for storing the huge data using third party that ensures that confidential data cannot be accessed by the other users. But with rapid growth of technologies, data in the cloud normally increases which questions its security in storing in the cloud.  Hence the protecting the cloud data seeks the strong security levels to counterfeit the different cloud attack. In order to achieve the highest level of security for cloud data, this study suggests a powerful encryption technique that combines chaotic scrolls and logistic maps. The proposed model exhibits the following advantages over the other algorithms: 1) High dynamic key generation 2) ability to counterfeit the multiple attacks 3) High randomness encrypted data which can provide more confusion of hacking from the intruder’s insight. To prove the strength of the proposed model, NIST National Institute of Science and Technology (NIST) is used for significant experiments. in which different statistical tests were carried out to prove the strength of the proposed model. The level of security of the suggested model is also evaluated and investigated using formal analysis using Burrows-Abadi-Needham Logic (BAN). The given model is thoroughly verified using both the Profverif tool and AVISPA. In terms of communication costs and unpredictability, the suggested model's randomness has also been contrasted with that of another existing algorithm. Results demonstrates that the proposed model shows its ability to provide more potent protection to the cloud data than the other existing encryption algorithms. 2024 2024 138 149 10.54216/JISIoT.120210 https://www.americaspg.com/articleinfo/18/show/2710