Inappropriate ownership transfers, weak access control, and incorrect authentication are just some of the most common external risks to public cloud installations. Cloud application developers may intentionally or unintentionally introduce these design-level issues. The difficulty that modern large-scale cloud deployments have in identifying and patching these vulnerabilities is a contributing factor to the decline in cloud QoS (quality of service) and the rise in overall system cost. Many different models of security patches have been developed by researchers and penetration testers in an effort to counteract this widespread issue. In this paper the Novel architecture is proposed that is applied to the header level to allow access to all data in incoming traffic. For the purpose of determining the most effective means of restricting access for possible internal and external attackers, this data is being processed by a context-aware rule-based engine. Moreover, it uses pattern analysis to assess the possibility of attacks like man-in-the-middle, cross-site scripting (XSS), SQL injection (SQLi), denial of service (DoS), and cross-site request forgery (CORS). By designing the network around the concept of a blockchain consortium, it is feasible to effectively exert ownership control without affecting the system's operation. This blockchain-based method stores all ownership requests in a private cloud until the content owner approves or rejects them, at which point they are transferred to the public cloud. These three properties of the model—distributed computing, immutability, and verifiability—are maintained by using a public/private chaining mechanism. The method has been evaluated across many cloud implementations, with consistent findings showing a 99.9% improvement in lowering the probability of external assaults while preserving or improving upon the efficiency of latency, throughput, and ownership transfer.