Enhanced Positional Vigenère (EPV): A Confidentiality-Enabled Encryption Technique for Secure Cloud Storage
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2026.17.4.09Keywords:
Cloud Computing, Data Security, Encryption, Enhanced Positional Vigenère (EPV)Dimensions Badge
Issue
Section
License
Copyright (c) 2026 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing is an internet-based computing paradigm that provides various hosting and delivery services over the internet. It offers computational resources to users based on their demand. Data storage is one of the main benefits of cloud computing. It provides users with plenty of space to store their data neatly and access it easily, no fuss involved. More and more companies are jumping on cloud platforms that offer Storage as a Service (STaaS), helping them skip the hefty upfront costs and ongoing maintenance of their own servers. However, when organizational and enterprise data are moved to public cloud storage, ensuring data protection and security becomes a critical concern. If unencrypted data is transmitted to the public cloud, there is a possibility of data breaches during transmission. To address this issue, an efficient technique called Enhanced Positional Vigenère (EPV) is proposed in this work. Strengthening the ciphertext and improving data security are the goals of the suggested approach. The EPV technique is implemented in Java, and our experiments show it boosts performance, ramps up efficiency, and makes the ciphertext even more complex.Abstract
How to Cite
Downloads
Similar Articles
- K. Vani, S. Sujatha, Fault tolerance systems in open source cloud computing environments–A systematic review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- K. Vani, S. Britto Ramesh Kumar, FSECAD: Feature-Selected Explainable Cloud Anomaly Detection Framework , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Khairunnisa, Dr. D. I. George Amalarethinam, STDO: Siberian Tiger and Devil Optimization — A Novel Hybrid Metaheuristic Algorithm for Energy-Efficient Task Scheduling in Cloud Computing , The Scientific Temper: Vol. 17 No. 03 (2026): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, MARCR: Method of allocating resources based on cost of the resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Expanding the quantity of virtual machines utilized within an open-source cloud infrastructure , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, The role of big data in transforming human resource analytics: A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- P. Hepsibah Kenneth, E. George Dharma Prakash Raj, Priority based parallel processing multi user multi task scheduling algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- K. Sreenivasulu, Sampath S, Arepalli Gopi, Deepak Kartikey, S. Bharathidasan, Neelam Labhade Kumar, Advancing device and network security for enhanced privacy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

