Enhanced Positional Vigenère (EPV): A Confidentiality-Enabled Encryption Technique for Secure Cloud Storage
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.4.09Keywords:
Cloud Computing, Data Security, Encryption, Enhanced Positional Vigenère (EPV)Dimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing is an internet-based computing paradigm that provides various hosting and delivery services over the internet. It offers computational resources to users based on their demand. Data storage is one of the main benefits of cloud computing. It provides users with plenty of space to store their data neatly and access it easily, no fuss involved. More and more companies are jumping on cloud platforms that offer Storage as a Service (STaaS), helping them skip the hefty upfront costs and ongoing maintenance of their own servers. However, when organizational and enterprise data are moved to public cloud storage, ensuring data protection and security becomes a critical concern. If unencrypted data is transmitted to the public cloud, there is a possibility of data breaches during transmission. To address this issue, an efficient technique called Enhanced Positional Vigenère (EPV) is proposed in this work. Strengthening the ciphertext and improving data security are the goals of the suggested approach. The EPV technique is implemented in Java, and our experiments show it boosts performance, ramps up efficiency, and makes the ciphertext even more complex.Abstract
How to Cite
Downloads
Similar Articles
- Ayesha Shakith, L. Arockiam, Enhancing classification accuracy on code-mixed and imbalanced data using an adaptive deep autoencoder and XGBoost , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Iftikhar A. Tayubi, Mayur D. Jakhete, Spoorthi B. Shetty, Ashish Verma, Mohit Tiwari, S. Kiruba, Sustainable healthcare AI-enhanced materials discovery and design for eco-friendly and biocompatible medical applications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Arvind K Shukla, Balaji V, Dharani R, M Ananthi, R Padmavathy, Romala V. Srinivas, Precision agriculture predictive modeling and sensor analysis for enhanced crop monitoring , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- V. Mahalakshmi, M. Manimekalai, Location Specific Paddy Yield Prediction using Monte Carlo Simulation incorporated Long Short-Term Memory , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- M. Balamurugan, A. Bharathiraja, An enhanced hybrid GCNN-MHA-GRU approach for symptom-to-medicine recommendation by utilizing textual analysis of customer reviews , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- R Sharmila, Nikhil S Patankar, Manjula Prabakaran, Chandra M. V. S. Akana, Arvind K Shukla, T. Raja, Recent developments in flexible printed electronics and their use in food quality monitoring and intelligent food packaging , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Remya Raj B., R. Suganya, A novel and an effective intrusion detection system using machine learning techniques , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- G Vanitha, M Kasthuri, A robust feature selection approach for high-dimensional medical data classification using enhanced correlation attribute evaluation , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.

