In today's highly competitive environment, it might be difficult to keep sensitive data or information safe. Sharing sensitive information between parties in a cloud environment requires a high level of trust between them. There are numerous methods for achieving data and information security, including cryptography, steganography, etc. This research introduces a new approach to mutual authentication by using a pre-trained model of a convolutional neural network (CNN) to identify malicious activity on the internet. In this research paper, we present a novel approach for enhancing the security of data in cloud computing environments through the design of a mutual authentication method for deep learning-based hybrid cryptography. Our approach combines the strengths of hybrid cryptography and the power of deep learning to provide a robust and adaptable solution for securing data in the cloud. One of the key innovations of our approach is the integration of a pre-trained convolutional neural network (CNN) model. This CNN plays a pivotal role in identifying and mitigating malicious activities on the internet that could pose a threat to cloud-based data. By continuously monitoring network traffic and data patterns, the CNN contributes to the proactive defense mechanism of our system. Secure communication between the involved parties is ensured by combining cryptography with authentication for key agreements. However, no known security method has simultaneously provided a high level of security and a fast execution time. When compared to older encryption systems, hybrid encryption techniques are far superior in terms of providing peace of mind for users. In order to provide robust security, this paper presents hybrid encryption procedures (HEA) by combination of symmetric key (Message Authentication Code [MAC]) and asymmetric key cryptographic procedures (Modified and Enhanced Lattice-Based Cryptography [MELBC]). Results from experiments show that the suggested HEA algorithm offers more security than competing security algorithms.