ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- James L T Thanga, Ashley Lalremruati, Agent’s roles and perspectives of life insurance market in North-East India , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Priya Tiwari, Bharat Kasar, Vibhu Tripathi, Decoding Investor’s behavior in tax saving mutual fund: A multi-item scale for evaluating investors’ category , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- P. Susai Raj, A. Edward William Benjamin, Evaluating the effectiveness of academic resilience intervention for at-risk students at higher secondary level , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Dimpal Khambhati, Chirag Patel, Analyzing cardiac physiology: ECG ensemble averaging and morphological features under treadmill-induced stress in LabVIEW , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Anjum Parvez, Sandhya Verma, Rajesh Bahuguna, Scientific Methods in Protection of Wildlife: A Need of Time , The Scientific Temper: Vol. 13 No. 01 (2022): The Scientific Temper
- Rakesh Thakur, Surender Singh, The Pangwala People of Pangi Region: Ethnography of Rituals and Ceremonies , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Deneshkumar V, Jebitha R, Jithu G, Multistate modeling for estimating clinical outcomes of COVID-19 patients , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Venkatesh R, A study on women empowerment by enhancing saving capabilities – through self-help groups , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Ahmed Mustefa, Validating the dairy marketing performance of Mizan-Aman town, Bench-Sheko zone, Ethiopia , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Bajeesh Balakrishnan, Swetha A. Parivara, E-HRM: Learning approaches, applications and the role of artificial intelligence , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 23 24 25 26 27 28 29 30 31 32 > >>
You may also start an advanced similarity search for this article.

