ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- Azar Bagheri Masoudzade, Maryam Ebrahim Nezhad, Appraising social class dimensions on learning motivation of Iranian students: Family studies and their status in focus , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Rimpi Manna, Anitha Arvind, Correlation between ocular surface disease index scores, tear film characteristics, and screen time usage among young adults , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Sreenath M.V. Reddy, D. Annapurna, Anand Narasimhamurthy, Influence node analysis based on neighborhood influence vote rank method in social network , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Abhishek Pandey, V Ramesh, Puneet Mittal, Suruthi, Muniyandy Elangovan, G.Deepa, Exploring advancements in deep learning for natural language processing tasks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Neha Verma, Beyond likes & clicks: Empowering role of social media marketing in value creation , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Akanksha Singh, Nand Kumar, Analysis of renewable energy and economic growth of Germany , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- J. Pavithra, Status of investment in startup in India – An analysis , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Priya Sharma, Jyoti Rana, Understanding Customer Awareness and effectiveness of Social Media Marketing in Banks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Sweta Jain, Jacob Joseph Kalapurackal, Green Innovation, Pressure, Green Training, and Green Manufacturing: Empirical evidence from the Indian apparel export industry , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Saloni M. Thacker, S. Z. Zubair Ahmed, Anaurene Roy, Influence of loneliness on self-esteem and mental wellbeing in non-domicle postgraduate students in Bangalore , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.

