Many sectors have begun adopting cloud computing. The hazards associated with virtualization and the dispersed nature of the cloud have resulted in a number of reported security threats and attacks. The complicated system and robust design necessitate a foundation of the fundamentals. In this paper, we introduce a fool proof system for authenticating and exchanging cloud data. An effective IPSO-KELM can identify malicious actions taken by users. The origin of the data is verified first. The IPSO-KELM then decides whether the data was malicious or authentic once the sender has been verified and before it is sent to the cloud. The SHA256-RSA technique protects normal data in transit. In this article, we compare and contrast the suggested IPSO-KELM and SHA256-RSA technique to identifying fraudulent users and sharing data in the cloud with other methods.