Open Access   Article Go Back

Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost

Ketakee Dangre1 , Amit Pampatwar2 , Raana Syeda3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 59-62, May-2019

Online published on May 12, 2019

Copyright © Ketakee Dangre, Amit Pampatwar, Raana Syeda . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ketakee Dangre, Amit Pampatwar, Raana Syeda, “Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.59-62, 2019.

MLA Style Citation: Ketakee Dangre, Amit Pampatwar, Raana Syeda "Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost." International Journal of Computer Sciences and Engineering 07.12 (2019): 59-62.

APA Style Citation: Ketakee Dangre, Amit Pampatwar, Raana Syeda, (2019). Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost. International Journal of Computer Sciences and Engineering, 07(12), 59-62.

BibTex Style Citation:
@article{Dangre_2019,
author = {Ketakee Dangre, Amit Pampatwar, Raana Syeda},
title = {Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {59-62},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1043},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1043
TI - Secure Image Deduplication Using DICE Protocol for Reducing Storage Cost
T2 - International Journal of Computer Sciences and Engineering
AU - Ketakee Dangre, Amit Pampatwar, Raana Syeda
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 59-62
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

Data deduplication is an important aspect for Cloud Storage Providers (CSPs) since it allows them to remove the identical data from their storage successfully. Some techniques have been proposed in the literature for this research area. Among these techniques, the Message Locked Encryption (MLE) scheme is frequently mentioned. Researchers have introduced Message locked Encryption based protocols which provide secured deduplication of data, where the data is in text form. As a result, multimedia data such as images, which are larger in size compared to text files, have not been given much attention. Applying secured data deduplication to such data files could significantly reduce the cost and space required for their storage. This helps in reducing maintenance cost as well for the storage providers. There are several other techniques for Data deduplication. Few of those techniques are as follows SPSD (Secure Perceptual Similarity Deduplication), CSPD (Client Based Secure Provable Deduplication), Image Compression.

Key-Words / Index Term

Image Deduplication, Data Security, Cloud Storage

References

[1]. Ashish Agarwala, Priyanka Singh, Pradeep K. Atrey, “Client Side Secure Image Deduplication Using DICE Protocol” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval, New York
[2]. A. Agarwala, P. Singh, and P. K. Atrey, “DICE: A dual
integrity convergent encryption protocol for client side secure data deduplication,” in IEEE International Conference on Systems, Man, and Cybernetics, Banff, Canada, 2017, pp.2176–2181.
[3]. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Messagelocked encryption and secure deduplication,” in Advances in Cryptology – 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013, pp. 296–312.
[4]. F. Rashid, A. Miri, and I. Woungang, “Secure image deduplication through image compression,” J. Inf. Secur. Appl.vol. 27, no. C, pp. 54–64, 2016.
[5]. D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J. Ma, and J. Ren, “A client-based secure deduplication of multimedia data,” in IEEE International Conference on communications, Paris, France, 2017, pp. 1–6
[6]. X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Computing, vol. 20, no. 4, pp. 1437–1448, 2016.
[7]. Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart, ” Message-Locked Encryption and Secure Deduplication” Eurocrypt 2013.
[8]. M. Bellare and S. Keelveedhi, “Interactive message-locked encryption and secure deduplication,” in Public-Key Cryptography – 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, 2015, pp. 516–538.
[9]. E. Torres, G. Callou, G. Alves, J. Accioly, and H. Gustavo, “Storage services in private clouds: Analysis, performance and availability modeling,” in IEEE International Conference on Systems, Man, and
Cybernetics, Budapest, Hungary, 2016, pp. 3288–3293.