ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- Poojith K. D. P, Somashekhara ., Dasharatha P. Angadi, Assessing the impact of cyclonic storm Tauktae on shoreline change in Mangaluru coast using geospatial technology , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- U. Perachiselvi, R. Balasubramani, Funding agencies in Tamil Nadu State Universities: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Jafar Ali, G. Ravi, D.I. George Amalarethinam, AI-Integrated Swarm-Powered Self-Scheduling Routing for Heterogeneous Wireless Sensor Networks to Maximize Network Lifetime , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Abhishek Dwivedi, Shekhar Verma, SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- B. Nivedetha, Water Quality Prediction using AI and ML Algorithms , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Sachin V. Chaudhari, Jayamangala Sristi, R. Gopal, M. Amutha, V. Akshaya, Vijayalakshmi P, Optimizing biocompatible materials for personalized medical implants using reinforcement learning and Bayesian strategies , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Roopesh K R, Jyothi Y, Manisha Bihani, Chandini C H, Nishanth D R, Maheshkumar Hondale, Sairashmi Samanta, Karthik G, Anu M, Neuroprotective effect of alcoholic extract of Selaginella bryopteris leaves in experimental models of epilepsy , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Aarthi Monalisa M, Anli Suresh, Adoptive bancassurance models transforming patronization among the insured , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Jasmine A, G. Arul Selvi, Structural Relationships between Social Media Usage Patterns and Value Orientation among College-Going Youth in Rural and Urban Tamil Nadu: A Structural Equation Modelling Approach , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Tara K. Sharma, Problems and prospects of tourism financing in Sikkim , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 14 15 16 17 18 19 20 21 22 23 > >>
You may also start an advanced similarity search for this article.

