ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.10Keywords:
Cloud computing, Cloud Security, deduplication, Convergent Encryption, Data Confidentiality, Block Cipher EncryptionDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for identical plaintexts, leading to increased storage requirements. To address these challenges, this paper presents ECEcipher, an advanced symmetric block cipher encryption technique that integrates convergent encryption for secure deduplication while ensuring strong data security. It uses a 196-bit encryption key, generated from the plaintext data, and applies substitution and permutation operations for enhanced security. Unlike conventional encryption, ECEcipher dynamically determines encryption rounds, making it harder to break. Performance evaluation shows ECEcipher outperforms DES and Blowfish in encryption speed and efficiency, making it ideal for real-time cloud applications. Additionally, ECEcipher supports deduplication without compromising security, ensuring optimized storage utilization. Security analysis using the ABC Universal Hackman Tool confirms higher resistance to brute-force and dictionary attacks.Abstract
How to Cite
Downloads
Similar Articles
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- J. Helan Shali Margret, N. Amsaveni, A study on recency patterns of cited resources in the cytokine publications from web of science , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Amit Maru, Dhaval Vyas, Hybrid deep learning approach for pre-flood and post-flood classification of remote sensed data , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Bommaiah Boya, Premara Devaraju, Integrating clinical and ECG data for heart disease prediction: A hybrid deep learning approach based on two modalities with particle swarm optimization , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Hannah Ayaba Tanye, Henry Akwetey Matey, Isaac Asampana, Albert Akanlisikum Akanferi, Douglas Yeboah , Augustina Dede Agor, Assessing the information security awareness among Ghanaian University students , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Pravin P. P, J. Arunshankar, Development of digital twin for PMDC motor control loop , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Sanjeev Kumar, Saurabh Charaya, Rachna Mehta, Multi-Metric Evaluation Framework for Machine Learning-Based Load Prediction in e-Governance Systems , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, A comparative analysis of virtual machines and containers using queuing models , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 4 5 6 7 8 9 10 11 12 13 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Priscilla I, Jayasimman Lawrence, Enhanced Symmetric Cryptography Technique (ESCTGPU) for Secure Communication between the IoT Gateway and the public Cloud Environment , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Olivia C. Gold, Jayasimman Lawrence, Enhanced LSTM for heart disease prediction in IoT-enabled smart healthcare systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper

