ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.10Keywords:
Cloud computing, Cloud Security, deduplication, Convergent Encryption, Data Confidentiality, Block Cipher EncryptionDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for identical plaintexts, leading to increased storage requirements. To address these challenges, this paper presents ECEcipher, an advanced symmetric block cipher encryption technique that integrates convergent encryption for secure deduplication while ensuring strong data security. It uses a 196-bit encryption key, generated from the plaintext data, and applies substitution and permutation operations for enhanced security. Unlike conventional encryption, ECEcipher dynamically determines encryption rounds, making it harder to break. Performance evaluation shows ECEcipher outperforms DES and Blowfish in encryption speed and efficiency, making it ideal for real-time cloud applications. Additionally, ECEcipher supports deduplication without compromising security, ensuring optimized storage utilization. Security analysis using the ABC Universal Hackman Tool confirms higher resistance to brute-force and dictionary attacks.Abstract
How to Cite
Downloads
Similar Articles
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Vijay Sharma, Nishu, Anshu Malhotra, An encryption and decryption of phonetic alphabets using signed graphs , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Dileep Pulugu, Shaik K. Ahamed, Senthil Vadivu, Nisarg Gandhewar, U D Prasan, S. Koteswari, Empowering healthcare with NLP-driven deep learning unveiling biomedical materials through text mining , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- S. C. Prabha, P. Sivaraaj, S. Kantha Lakshmi, Data analysis and machine learning-based modeling for real-time production , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, AI-driven real-time performance optimization and comparison of virtual machines and containers in cloud environments , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rahat Yezdani, S. M. K. Quadri, A PPR-based energy-efficient VM consolidation in cloud computing , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- M. Ragul, A. Aloysius, V. Arul Kumar, Enhancing IoT blockchain scalability through the eepos consensus algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper

