Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost

Authors

  • Dangre K M.Tech, Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • PampatwarA M.Tech, Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Syeda R M.Tech, Department of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India

Keywords:

Image Deduplication, Data Security, Cloud Storage

Abstract

Data deduplication is an important aspect for Cloud Storage Providers (CSPs) since it allows them to remove the identical data from their storage successfully. Some techniques have been proposed in the literature for this research area. Among these techniques, the Message Locked Encryption (MLE) scheme is frequently mentioned. Researchers have introduced Message locked Encryption based protocols which provide secured deduplication of data, where the data is in text form. As a result, multimedia data such as images, which are larger in size compared to text files, have not been given much attention. Applying secured data deduplication to such data files could significantly reduce the cost and space required for their storage. This helps in reducing maintenance cost as well for the storage providers. There are several other techniques for Data deduplication. Few of those techniques are as follows SPSD (Secure Perceptual Similarity Deduplication), CSPD (Client Based Secure Provable Deduplication), Image Compression.

References

[1] Ashish Agarwala, Priyanka Singh, Pradeep K. Atrey, “Client Side Secure Image Deduplication Using DICE Protocol” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval, New York

[2] A. Agarwala, P. Singh, and P. K. Atrey, “DICE: A dual

integrity convergent encryption protocol for client side secure data deduplication,” in IEEE International Conference on Systems, Man, and Cybernetics, Banff, Canada, 2017, pp.2176–2181.

[3] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Messagelocked encryption and secure deduplication,” in Advances in Cryptology – 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013, pp. 296–312.

[4] F. Rashid, A. Miri, and I. Woungang, “Secure image deduplication through image compression,” J. Inf. Secur. Appl.vol. 27, no. C, pp. 54–64, 2016.

[5] D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J. Ma, and J. Ren, “A client-based secure deduplication of multimedia data,” in IEEE International Conference on communications, Paris, France, 2017, pp. 1–6

[6] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Computing, vol. 20, no. 4, pp. 1437–1448, 2016.

[7] Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart, ” Message-Locked Encryption and Secure Deduplication” Eurocrypt 2013.

[8] M. Bellare and S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,” in Public-Key Cryptography – 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, 2015, pp. 516–538.

[9] E. Torres, G. Callou, G. Alves, J. Accioly, and H. Gustavo, “Storage services in private clouds: Analysis, performance and availability modeling,” in IEEE International Conference on Systems, Man, andCybernetics, Budapest, Hungary, 2016, pp. 3288–3293.

Downloads

Published

2025-11-25

How to Cite

[1]
K. Dangre, A. Pampatwar, and R. Syeda, “Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost”, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 59–62, Nov. 2025.