ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.10Keywords:
Cloud computing, Cloud Security, deduplication, Convergent Encryption, Data Confidentiality, Block Cipher EncryptionDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for identical plaintexts, leading to increased storage requirements. To address these challenges, this paper presents ECEcipher, an advanced symmetric block cipher encryption technique that integrates convergent encryption for secure deduplication while ensuring strong data security. It uses a 196-bit encryption key, generated from the plaintext data, and applies substitution and permutation operations for enhanced security. Unlike conventional encryption, ECEcipher dynamically determines encryption rounds, making it harder to break. Performance evaluation shows ECEcipher outperforms DES and Blowfish in encryption speed and efficiency, making it ideal for real-time cloud applications. Additionally, ECEcipher supports deduplication without compromising security, ensuring optimized storage utilization. Security analysis using the ABC Universal Hackman Tool confirms higher resistance to brute-force and dictionary attacks.Abstract
How to Cite
Downloads
Similar Articles
- G. Chitra, Hari Ganesh S., Cultural algorithm based principal component analysis (CA-PCA) approach for handling high dimensional data , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Nilesh M. Patil, P M. Krishna, G. Deena, C Harini, R.K. Gnanamurthy, Romala V. Srinivas, Exploring real-time patient monitoring and data analytics with IoT-based smart healthcare monitoring , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Priydarshi Shireesh, Tiwari Atul Kumar, Singh Prashant, Rai Kumud, Mishra Dev Brat, Comparative Water Quality Analysis in Beso River in District Jaunpur, Azamgarh and Ghazipur Uttar Pradesh , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. A. Askerov, The role of improving the business environment in agriculture in ensuring the country’s food security , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Habtamu Rufe Gurmu, M. Krishna Naidu, Garedo Tesfa, Assessment of Factors Influencing Use of Insecticide among Smallholders Farmers in Dale Sadi District of Kellem Wallega Zone, Ethiopia , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Vimala S, G. Arockia Sahaya Sheela, Label-Aware Imputation with Cluster Refinement for Smartphone Usage Analytics in Educational Institutions , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
<< < 6 7 8 9 10 11 12 13 14 15 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper

