The ability to interpret and create code is known as cryptography and has been used to exchange information between peer parties securely. An encryption algorithm is a type of network security model that consists of designing and putting into practice cryptographic algorithms and the supporting framework to help secure data. This cryptosystem is intended for use with cloud data. Cloud security, usually called cloud computing security, is the technique of securing infrastructure, applications, and data stored in the cloud from cyber threats and attacks. This study proposes a new encryption method based on the (x; y) points generated by circles to protect data in the cloud. Using a map table, a new mapping technique is shown in this study to transfer a plain text value to a point on a predetermined circle over the finite field GF (pm). This mapping technique produces a high dispersion of various spots for recurrent intensity values while being highly quick, simple to use, and with low entropy for plain text input. The implementation of the encryption and decryption processes is extensively studied and analyzed. Security analysis is done after encryption is implemented to determine how resilient the suggested technique is against statistical threats. The results shown in this study prove the superiority of the proposed algorithm.