South Asian Journal of Engineering and Technology https://sajet.in/index.php/journal <p><strong>South Asian Journal of Engineering and Technology (SAJET)</strong> <strong>E-ISSN: (2454-9614) </strong>weekly peer-reviewed online publications focus all areas of Science Engineering and Technology.</p> <p><strong>South Asian Journal of Engineering and Technology (SAJET)</strong> publish original articles, short communications, review articles, and case reports is concerned with the study in the field of electrical, mechanical, electronics, civil, biotechnology, materials engineering, computer science engineering, mathematics, agriculture engineering and nanotechnology.</p> <p><strong>South Asian Journal of Engineering and Technology (SAJET)</strong> ambition directed towards cover the current distinguished research advancements in different areas of engineering and technology. We are the association of academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online.<strong> South Asian Journal of Engineering and Technology (SAJET)</strong> journal aims to cover scientific research in an extensive sense and not publishing a niche area of research facilitating researchers from various fields to publish their papers. It is also designed to arrange a platform for the researchers to publish in a short span of time, enabling them to continue further all articles published are freely available to the scientific community in the government agencies, educators and the general public. We are taking our great efforts to popularize <strong>South Asian Journal of Engineering and Technology (SAJET) </strong>journal across the globe in numerous ways, we are sure that <strong>South Asian Journal of Engineering and Technology (SAJET) </strong>journal will act as an efficient platform for all researchers to publish their works online</p> en-US editorinchief@sajet.in (Dr.P.Jayamurugan) contact@eleyon.org (ELEYON PUBLISHERS) Wed, 07 Jan 2026 09:05:17 +0000 OJS 3.3.0.11 http://blogs.law.harvard.edu/tech/rss 60 Hybrid Encryption and Intelligent Pattern-Matching Architecture for Cloud Security https://sajet.in/index.php/journal/article/view/349 <p>The escalating frequency of data breaches in cloud storage environments has exposed the inadequacies of monolithic security models, where static authentication and opaque server-side encryption fail to protect against credential compromise and insider threats. This work presents Zenith, a secure cloud management platform that unifies multi-layered defense mechanisms across three critical domains: cryptographic access control, hybrid dual-encryption architecture, and automated threat detection. The Security Management Service implements RFC 6238-compliant Time-based One-Time Password (TOTP) authentication using HMAC-SHA1 verification with a flexible 90-second drift tolerance window, achieving verification speeds of 10–20ms while mitigating replay attacks. The encryption framework introduces a hybrid model offering Server-Side Encryption (SSE) using AWS S3 native AES-256 for general performance, and a zero-knowledge Client-Side Encryption (CSE) architecture that derives 256-bit keys using PBKDF2-HMAC-SHA256 with 100,000 iterations and a unique 16-byte salt, ensuring the platform possesses no decryption capability for sensitive data. To proactively prevent data leakage, an Automated Sensitive Data Detection pipeline utilizes regex-based pattern matching to identify Personally Identifiable Information (PII), credit card sequences (13−16 digits), and private IP ranges in real time, automatically triggering mandatory encryption workflows for flagged files. Data durability and disaster recovery are secured through AWS Cross-Region Replication (CRR) spanning approximately 2,800 miles (N. Virginia to Oregon), achieving 99.999999999% (eleven nines) data durability with eventual consistency typically achieved within 15 minutes.Comprehensive session auditing through MongoDB collects the device fingerprint and geolocation information, giving fine-grained visibility to access patterns. Experimental validation looks at that the platform balances rigorous security with operational efficiency, maintaining a client-side encryption overhead of only 200–300ms&nbsp;per megabyte, effectively establishing a compliant, resilient, and transparent foundation for secure cloud data management.</p> Atharva Gupta, Arun Kumar R, A Prithiviraj, E Saravana Kumar Copyright (c) 2026 https://sajet.in/index.php/journal/article/view/349 Wed, 07 Jan 2026 00:00:00 +0000 Self-Healing Cybersecurity System for Cloud Environments https://sajet.in/index.php/journal/article/view/350 <p>Cloud computing has become the backbone of today’s digital landscape. It provides high scalability, flexibility, and cost savings. However, its distributed and changing nature makes it susceptible to various cyber threats, such as insider misuse, ransomware, and advanced persistent threats (APTs). This paper introduces a Self-Healing Cybersecurity System (SHCS) for cloud environ- ments that merges intelligent anomaly detection with automatic recovery processes. The framework combines Machine Learning (ML) and Deep Learning (DL) models for real-time threat detection. These models quickly identify harmful activities and system issues in cloud environments. To ensure data integrity, blockchain technology logs information securely and transparently, aiding auditing and regulatory compliance. Experimental results show that this AI-driven method greatly improves system resilience, reduces operational downtime, and builds trust in multi-tenant cloud infrastructures.</p> Priya Adhikari, Ramya Halagani, Raksha Shetty, Prem Manasing Rathod, Dr. E. SaravanaKumar Copyright (c) 2026 https://sajet.in/index.php/journal/article/view/350 Wed, 07 Jan 2026 00:00:00 +0000