ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure
Data Security in Cloud Infrastructure
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.19Keywords:
Cloud computing security, Data protection, Cryptographic, Symmetric encryption, Data encryptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The rapid adoption of cloud computing has transformed IT resource management by providing scalable, flexible, and cost-effective solutions. Despite these benefits, cloud computing presents critical security challenges, particularly in protecting sensitive data during transmission and storage. This paper introduces the Enhanced Cloud Data Security (ECDS) technique, a new approach aimed at strengthening data protection within cloud infrastructures. ECDS incorporates substitution and permutation methods to secure data and utilizes a combination of encryption strategies to ensure that encrypted data remains inaccessible to unauthorized users. ECDS is a symmetric cryptographic system that uses the same key for encryption and decryption. It is 256-bit block cipher encryption and it uses 312-but keys. The ECDS is implemented in Python and compared against DES and Blowfish Encryption techniques. Extensive testing and performance analysis reveal that ECDS significantly enhances security and efficiency compared to traditional encryption methods. This paper contributes to the ongoing efforts to secure cloud computing environments for safeguarding sensitive data in the cloud.Abstract
How to Cite
Downloads
Similar Articles
- Raghvendra, Tulika Saxena, Saurabh Verma, Rashi Saxena, Smita Dron, Shilpi Singh, Combination of financial literacy, strategic marketing and effective human resource for sustainable household wealth development , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Amanda Quist Okronipa, Isaac Asampana, Jones Yeboah Nyame, Exploring e-learning system loyalty: The role of system quality and satisfaction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Amanda Quist Okronipa, Lucy Ewuresi Eghan, A theoretical investigation of students’ adoption of artificial intelligence chatbots using social cognitive theory and uses and gratification theory , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Priya Rajwade, Alka Bansal, A study of the perceptions of teachers towards a holistic approach in teaching in CBSE board schools in the context of NEP 2020 at the foundational and preparatory stages , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Prithi M., Sudhakar S., Effect of autoregulatory progressive resistance exercise on hip extensor and knee flexor muscles on power, balance, and Ollie performance among skateboarders , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Engida Admassu, Classifying enset based on their disease tolerance using deep learning , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Anurag B. Gohain1, Devanand Mishra, Vithou U Mera, Content analysis of academic library website with special reference to the central universities in Northeast India , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Kanwar D Singh, Rashmi Ashtt, Barriers to last mile connectivity: The role of crime in metro station accessibility , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Veena Grace Carmel, Correlative Analysis of Cryptocurrencies and Stocks from Asset and Investment Perspective , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Nagendra Kumar Yadav, PESTICIDE TOXICITY AND BIOCHEMICAL CHANGES IN FRESHWATER FISHES , The Scientific Temper: Vol. 9 No. 1&2 (2018): The Scientific Temper
<< < 24 25 26 27 28 29 30 31 32 33 > >>
You may also start an advanced similarity search for this article.

