ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.10Keywords:
Cloud computing, Cloud Security, deduplication, Convergent Encryption, Data Confidentiality, Block Cipher EncryptionDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for identical plaintexts, leading to increased storage requirements. To address these challenges, this paper presents ECEcipher, an advanced symmetric block cipher encryption technique that integrates convergent encryption for secure deduplication while ensuring strong data security. It uses a 196-bit encryption key, generated from the plaintext data, and applies substitution and permutation operations for enhanced security. Unlike conventional encryption, ECEcipher dynamically determines encryption rounds, making it harder to break. Performance evaluation shows ECEcipher outperforms DES and Blowfish in encryption speed and efficiency, making it ideal for real-time cloud applications. Additionally, ECEcipher supports deduplication without compromising security, ensuring optimized storage utilization. Security analysis using the ABC Universal Hackman Tool confirms higher resistance to brute-force and dictionary attacks.Abstract
How to Cite
Downloads
Similar Articles
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- C. Premila Rosy, Clustering of cancer text documents in the medical field using machine learning heuristics , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Avdhesh Kumar, Manoj Agarwal, Studies on challenges and opportunities for foreign direct investment in the automobile industry in India , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Naveena Somasundaram, Vigneshkumar M, Sanjay R. Pawar, M. Amutha, Balu S, Priya V, AI-driven material design for tissue engineering a comprehensive approach integrating generative adversarial networks and high-throughput experimentation , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- C. Muruganandam, V. Maniraj, A Self-driven dual reinforcement model with meta heuristic framework to conquer the iot based clustering to enhance agriculture production , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- S. Vanaja, Hari Ganesh S, Application of data mining and machine learning approaches in the prediction of heart disease – A literature survey , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper

