Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost
Keywords:
Image Deduplication, Data Security, Cloud StorageAbstract
Data deduplication is an important aspect for Cloud Storage Providers (CSPs) since it allows them to remove the identical data from their storage successfully. Some techniques have been proposed in the literature for this research area. Among these techniques, the Message Locked Encryption (MLE) scheme is frequently mentioned. Researchers have introduced Message locked Encryption based protocols which provide secured deduplication of data, where the data is in text form. As a result, multimedia data such as images, which are larger in size compared to text files, have not been given much attention. Applying secured data deduplication to such data files could significantly reduce the cost and space required for their storage. This helps in reducing maintenance cost as well for the storage providers. There are several other techniques for Data deduplication. Few of those techniques are as follows SPSD (Secure Perceptual Similarity Deduplication), CSPD (Client Based Secure Provable Deduplication), Image Compression.
References
[1] Ashish Agarwala, Priyanka Singh, Pradeep K. Atrey, “Client Side Secure Image Deduplication Using DICE Protocol” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval, New York
[2] A. Agarwala, P. Singh, and P. K. Atrey, “DICE: A dual
integrity convergent encryption protocol for client side secure data deduplication,” in IEEE International Conference on Systems, Man, and Cybernetics, Banff, Canada, 2017, pp.2176–2181.
[3] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Messagelocked encryption and secure deduplication,” in Advances in Cryptology – 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013, pp. 296–312.
[4] F. Rashid, A. Miri, and I. Woungang, “Secure image deduplication through image compression,” J. Inf. Secur. Appl.vol. 27, no. C, pp. 54–64, 2016.
[5] D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J. Ma, and J. Ren, “A client-based secure deduplication of multimedia data,” in IEEE International Conference on communications, Paris, France, 2017, pp. 1–6
[6] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Computing, vol. 20, no. 4, pp. 1437–1448, 2016.
[7] Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart, ” Message-Locked Encryption and Secure Deduplication” Eurocrypt 2013.
[8] M. Bellare and S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,” in Public-Key Cryptography – 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, 2015, pp. 516–538.
[9] E. Torres, G. Callou, G. Alves, J. Accioly, and H. Gustavo, “Storage services in private clouds: Analysis, performance and availability modeling,” in IEEE International Conference on Systems, Man, andCybernetics, Budapest, Hungary, 2016, pp. 3288–3293.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
