Due to the tremendous development in various domains, both internet of things (IoTs) and cloud-based computing are recognised as emerged technologies of the 20th century. IoT collection of heterogeneous interconnected embedded devices, then cloud computing provides the possible infrastructure which could be used at any time and from anywhere. In recent times, due to the advancements in IoT and cloud computing-based devices, mainly their ability to provide remote services, they have been employed in various real-life domains. The integration of IoT with the cloud infrastructure may lead to security issues. Moreover, these IoT-based devices act as a prerequisite for linking through high-resource hubs such as cloud server (CS) for communication and resource sharing. Such a combination comprises security hazards and introduces dishonest data, the principal factors in a system fiasco. In addition, IoT policies are accommodated on public web links, which perturb the secrecy of trustworthy operators. Hence, this article planned an authentication idea on ECC for IoT-based embedded devices with CS. We discover the fuzzy structure facility for channel non-reciprocal, then ECC with one-way hash functions for secure validation. In conclusion, we scrutinise the planned procedure through the AVISPA and related the resource constraints costs with existing authentication procedures.