Cloud technology is essential for modern businesses, revolutionizing IT by overcoming traditionaldata processing limitations. However, security concerns, especially with increasing cloud attacks,pose a significant challenge to the potential benefits of cloud computing. This article explores thefundamentals and models of Cloud Computing, shedding light on the critical issue of security inthis evolving landscape. This study examines the usage of CloudSim, a cost-free and open-sourceprogramme, for the purpose of simulating and comparing secure cryptographic encryption methods.We propose two novel methodologies: Geometrical Cryptography Technique (GCT) and CircularCryptographic Technique (CCT). Both methodologies are simulated and executed using CloudSim,enabling a regulated and repeatable comparison across different performance measures. We assessboth strategies by considering criteria such as code length, space complexity, and time complexity. The findings indicate positive results for both GCT and CCT , presenting encouraging possibilities for further investigation andadvancement in secure communication systems based on cloud computing. This study complements tothe current discussion about strengthening security measures in cloud computing settings, providingsignificant insights on the viability and efficacy of various cryptographic methods for protecting thetransmission of resource allocation requests.