ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- M. Yamunadevi, P. Ponmuthuramalingam, A review and analysis of deep learning methods for stock market prediction with variety of indicators , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Sapna Pathakji, Shilpi Sharma, Transgender Persons (Protection of Rights) Act, 2019: A critical evaluation of rights access and implementation for the transgender community in India , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Ishfaq Ahmad Malik, Showkat Ahmad Shah, Economic impact of COVID-19 on Ethiopian micro, small, and medium enterprises and policy measures , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Maria D. Roopa, Nimitha John, Bayesian Optimization Phase I Design of Experiment Models , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Shivali Kundan, Neha Verma, Zahid Nabi, Dinesh Kumar, Satellite radiance assimilation using the 3D-var technique for the heavy rainfall over the Indian region , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Viji Parthasarathy, Manikandasaran S S, Feature Selection Techniques for IOT Crop Yield Prediction Using Smart Farming Sensor Data , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Raja Pathak, Shweta Kumari, An investigation on the impact of vedic mathematics on higher secondary school student’s ability to expand mathematical units , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Muhammed Jouhar K. K., K. Aravinthan, A bigdata analytics method for social media behavioral analysis , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- RUCHI SHARMA, YOUGESH KUMAR, STATISTICAL ANALYSIS OF MONOGENEAN POPULATIONS INFESTING FRESH WATER FISH CHANNA PUNCTATUS , The Scientific Temper: Vol. 10 No. 1&2 (2019): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.

