ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- Geetha Satish Pisharody, Sanjay Gupta, Effect of School Aspects on the Adversity Profile of Higher Secondary School Students , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Elangovan G. Reddy, Anjana Devi V, Subedha V, Tirapathi Reddy B, Viswanathan R, A smart irrigation monitoring service using wireless sensor networks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sindhu S, L. Arockiam, DRMF: Optimizing machine learning accuracy in IoT crop recommendation with domain rules and MissForest imputation , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Punithavathy E, N. Priya, A resilience framework for fault-tolerance in cloud-based microservice applications , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rakhimov S. Bekturdievich, Grave structures of the population of the lower part of the Amudarya in the islamic period (On the example of archeological monuments of IX-XIII centuries) , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Aakanksha Laiker, Promil Pande, Contribution of policy and regulations to enhance Transparency and Traceability in the Garment Industry , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Deepesh Bhardwaj, Niyati Chaudhary, Green Premium: Assessing the Influence of Sustainability Features on Real Estate Market Value in Delhi NCR , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Arvind K Shukla, Balaji V, Dharani R, M Ananthi, R Padmavathy, Romala V. Srinivas, Precision agriculture predictive modeling and sensor analysis for enhanced crop monitoring , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 19 20 21 22 23 24 25 26 27 28 > >>
You may also start an advanced similarity search for this article.

