ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.10Keywords:
Cloud computing, Cloud Security, deduplication, Convergent Encryption, Data Confidentiality, Block Cipher EncryptionDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for identical plaintexts, leading to increased storage requirements. To address these challenges, this paper presents ECEcipher, an advanced symmetric block cipher encryption technique that integrates convergent encryption for secure deduplication while ensuring strong data security. It uses a 196-bit encryption key, generated from the plaintext data, and applies substitution and permutation operations for enhanced security. Unlike conventional encryption, ECEcipher dynamically determines encryption rounds, making it harder to break. Performance evaluation shows ECEcipher outperforms DES and Blowfish in encryption speed and efficiency, making it ideal for real-time cloud applications. Additionally, ECEcipher supports deduplication without compromising security, ensuring optimized storage utilization. Security analysis using the ABC Universal Hackman Tool confirms higher resistance to brute-force and dictionary attacks.Abstract
How to Cite
Downloads
Similar Articles
- Komal Raichura, Asha L. Bavarava, Redefining Classroom Dynamics: AI Tools and the Future of English Language Pedagogy , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Sreenath M.V. Reddy, D. Annapurna, Anand Narasimhamurthy, Influence node analysis based on neighborhood influence vote rank method in social network , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Abhishek Pandey, V Ramesh, Puneet Mittal, Suruthi, Muniyandy Elangovan, G.Deepa, Exploring advancements in deep learning for natural language processing tasks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Neha Verma, Beyond likes & clicks: Empowering role of social media marketing in value creation , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Aakanksha Laiker, Promil Pande, Contribution of policy and regulations to enhance Transparency and Traceability in the Garment Industry , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Hardik Talsania, Kirit Modi, Attention-Enhanced Multi-Modal Machine Learning for Cardiovascular Disease Diagnosis , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Shriram N. Kargaonkar, Sushma Pradeep Chalke, Sunil Mahajan, Statistical Modeling of Consumer Preferences for Eco-friendly Digital Products: A Data-driven Approach Toward Sustainable Consumption in India , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- P. Ananthi, A. Chandrabose, Exploring learning-assisted optimization for mobile crowd sensing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Geetha Satish Pisharody, Sanjay Gupta, Effect of School Aspects on the Adversity Profile of Higher Secondary School Students , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
<< < 20 21 22 23 24 25 26 27 28 29 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper

