Deduplication of Image at Client Side Using DICE Protocol

Authors

  • Akshay R Department of Computer Science ,East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Ankith AK Department of Computer Science ,East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Amith B Department of Computer Science ,East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Jayanth R Department of Computer Science ,East West Institute of technology, Vishveswaraya Technological University, Bangalore, India
  • Mensinkai K Department of Computer Science ,East West Institute of technology, Vishveswaraya Technological University, Bangalore, India

Keywords:

De-duplication, Storage system, DICE protocol, Cloud storage

Abstract

With the approach of distributed computing, verified information de-duplication has picked up a ton of fame. Numerous methods have been proposed in the writing of this continuous research territory. Among these procedures, theMessage Locked Encryption (MLE) conspire is regularly referenced. Analysts have presented MLE based conventions which give verified de-duplication of information, where the information is by and large in content structure. Thus, sight and sound information, for example, pictures and video, which are bigger in size contrasted with content documents, have not been given much consideration. Applying tied down information de-duplication to such information documents could essentially decrease the expense and space required for their capacity. In this paper we present a safe de-duplication conspire for close indistinguishable (CI) pictures utilizing the Dual Integrity Convergent Encryption (DICE) convention, which is a variation of the MLE based plan. In the proposed plan, a picture is disintegrated into squares and the DICE convention is connected on each square independently as opposed to on the whole picture. As a result, the hinders that are normal between at least two CI pictures are put away just once at the cloud.

References

[1] T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W.Lou, “Towards efficient fully randomized message-locked encryption”, on the 21st Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 2016, pp. 361-375.

[2] D. Koo, J. Hur, and H. Yoon, “Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage,” in Frontier and Innovation in Future Computing and Communication, Dordrecht, 2014, pp. 229-235.

[3] A. Agarwala, P. Singh, and P.K. Atrey, “DICE: A dual integrity convergent encryption protocol for client side secure data deduplication,” in IEEE International Conference on Systems, Man, and Cybernetics, Banff, Canada, 2017, pp.2176-2181.

[4] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message locked encryption and secure deduplication,” in Advances in Cryptology-32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013, pp. 296-312.

[5] M. Bellare and S. Keelveedhi, “Interactive message locked encryption and secure deduplication,” in Public Key Cryptography- 18th IACR International Conference on Practice and Theory in Public Key Cryptography, Gaithersburg, MD, USA, 2015, pp. 516-538.

[6] J. Stanek, A. Sorniotti, E. Androulaki, and L.Kencl, “A secure data deduplication scheme for cloud storage,” in Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 99-118.

[7] M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, “Secure data deduplication,” in Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, 2008, pp. 1-10.

[8] J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,” in the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 2002, pp. 617-624.

[9] K. Keonwoo, Y. Taek-Young, J. Nam-Su, and C. Ku-Young, “Client-side deduplication to enhance security and reduce communication costs,” ETRI Journal, vol. 39, no. 2, pp. 116-123,2017.

[10] H. Gang, H. Yan, and L. Xu, Secure Image Deduplication in Cloud Storage. Cham: Springer International Publishing, 2015, pp. 243-251.

[11] F. Rashid, A. Miri, and I. Woungang, “Secure image deduplication through image compression,” J. Inf. Secur. Appl., vol. 27, no. C, pp. 54-64, 2016.

[12] D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J. Ma, and J. Ren, “A client-based secure deduplication of multimedia data,” in IEEE International Conference on Communications, Paris, France, 2017, pp. 1-6.

[13] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Computing, vol. 20, no. 4, pp. 1437-1448, 2016.

[14] Ashish Agarwala, Priyanka Singh, Pradeep k, “Client side secure image deduplication using DICE protocol,” Albony, New York, USA.

Downloads

Published

2025-11-26

How to Cite

[1]
A. R, A. AK, A. B, J. R, and K. Mensinkai, “Deduplication of Image at Client Side Using DICE Protocol”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 36–42, Nov. 2025.