Enhanced Positional Vigenère (EPV): A Confidentiality-Enabled Encryption Technique for Secure Cloud Storage
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.4.09Keywords:
Cloud Computing, Data Security, Encryption, Enhanced Positional Vigenère (EPV)Dimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing is an internet-based computing paradigm that provides various hosting and delivery services over the internet. It offers computational resources to users based on their demand. Data storage is one of the main benefits of cloud computing. It provides users with plenty of space to store their data neatly and access it easily, no fuss involved. More and more companies are jumping on cloud platforms that offer Storage as a Service (STaaS), helping them skip the hefty upfront costs and ongoing maintenance of their own servers. However, when organizational and enterprise data are moved to public cloud storage, ensuring data protection and security becomes a critical concern. If unencrypted data is transmitted to the public cloud, there is a possibility of data breaches during transmission. To address this issue, an efficient technique called Enhanced Positional Vigenère (EPV) is proposed in this work. Strengthening the ciphertext and improving data security are the goals of the suggested approach. The EPV technique is implemented in Java, and our experiments show it boosts performance, ramps up efficiency, and makes the ciphertext even more complex.Abstract
How to Cite
Downloads
Similar Articles
- M. Monika, J. Merline Vinotha, Optimization of a Lean Vendor–Buyer Supply Chain Model under Neutrosophic Fuzzy Environment with Transportation, Loading, and Unloading Considerations , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Ekta Singh, Ekta Rani, Trends and Determinants of Mergers and Acquisitions in the Manufacturing Sector in India , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- V.Samuthira Pandi, B. R. Senthil kumar, M Anusuya, Annu Dagar, Synthesis and characterization of ZnO, ZnO doped Ag2O nanoparticles and its photocatalytic activity , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Thilagavathi K, Thankamani K., P. Shunmugapriya, D. Prema, Navigating fake reviews in online marketing: Innovative strategies for authenticity and trust in the digital age , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Jasmine A, G. Arul Selvi, Exploring Behavioural Dimensions of Social Media Engagement: An Exploratory Factor Analysis Among College Youth , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Pavithra M, Dr. R. Neelaveni, Muthuraman K. R , Kamalesh G, Design of an interactive smart band for intellectually disabled person , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Bajeesh Balakrishnan, Swetha A. Parivara, E-HRM: Learning approaches, applications and the role of artificial intelligence , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Bayelign A. Zelalem, Ayalew A. Abebe, Evaluating supply chain management practice among micro and small manufacturing enterprise in southwest, Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Raghvendra, Tulika Saxena, Saurabh Verma, Rashi Saxena, Smita Dron, Shilpi Singh, Combination of financial literacy, strategic marketing and effective human resource for sustainable household wealth development , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 37 38 39 40 41 42 43 44 45 46 > >>
You may also start an advanced similarity search for this article.

