Open Access   Article Go Back

Deduplication of Image at Client Side Using DICE Protocol

Akshay R1 , Ankith A K2 , Amith B3 , Jayanth R4 , Kiran Mensinkai5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 36-42, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.3642

Online published on May 16, 2019

Copyright © Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai, “Deduplication of Image at Client Side Using DICE Protocol,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.36-42, 2019.

MLA Style Citation: Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai "Deduplication of Image at Client Side Using DICE Protocol." International Journal of Computer Sciences and Engineering 07.15 (2019): 36-42.

APA Style Citation: Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai, (2019). Deduplication of Image at Client Side Using DICE Protocol. International Journal of Computer Sciences and Engineering, 07(15), 36-42.

BibTex Style Citation:
@article{R_2019,
author = {Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai},
title = {Deduplication of Image at Client Side Using DICE Protocol},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {36-42},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1197},
doi = {https://doi.org/10.26438/ijcse/v7i15.3642}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.3642}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1197
TI - Deduplication of Image at Client Side Using DICE Protocol
T2 - International Journal of Computer Sciences and Engineering
AU - Akshay R, Ankith A K, Amith B, Jayanth R, Kiran Mensinkai
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 36-42
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

With the approach of distributed computing, verified information de-duplication has picked up a ton of fame. Numerous methods have been proposed in the writing of this continuous research territory. Among these procedures, theMessage Locked Encryption (MLE) conspire is regularly referenced. Analysts have presented MLE based conventions which give verified de-duplication of information, where the information is by and large in content structure. Thus, sight and sound information, for example, pictures and video, which are bigger in size contrasted with content documents, have not been given much consideration. Applying tied down information de-duplication to such information documents could essentially decrease the expense and space required for their capacity. In this paper we present a safe de-duplication conspire for close indistinguishable (CI) pictures utilizing the Dual Integrity Convergent Encryption (DICE) convention, which is a variation of the MLE based plan. In the proposed plan, a picture is disintegrated into squares and the DICE convention is connected on each square independently as opposed to on the whole picture. As a result, the hinders that are normal between at least two CI pictures are put away just once at the cloud.

Key-Words / Index Term

De-duplication, Storage system, DICE protocol, Cloud storage

References

[1] T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W.Lou, “Towards efficient fully randomized message-locked encryption”, on the 21st Australasian Conference on Information Security and Privacy, Melbourne, VIC, Australia, 2016, pp. 361-375.
[2] D. Koo, J. Hur, and H. Yoon, “Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage,” in Frontier and Innovation in Future Computing and Communication, Dordrecht, 2014, pp. 229-235.
[3] A. Agarwala, P. Singh, and P.K. Atrey, “DICE: A dual integrity convergent encryption protocol for client side secure data deduplication,” in IEEE International Conference on Systems, Man, and Cybernetics, Banff, Canada, 2017, pp.2176-2181.
[4] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message locked encryption and secure deduplication,” in Advances in Cryptology-32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013, pp. 296-312.
[5] M. Bellare and S. Keelveedhi, “Interactive message locked encryption and secure deduplication,” in Public Key Cryptography- 18th IACR International Conference on Practice and Theory in Public Key Cryptography, Gaithersburg, MD, USA, 2015, pp. 516-538.
[6] J. Stanek, A. Sorniotti, E. Androulaki, and L.Kencl, “A secure data deduplication scheme for cloud storage,” in Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 99-118.
[7] M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, “Secure data deduplication,” in Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, 2008, pp. 1-10.
[8] J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,” in the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 2002, pp. 617-624.
[9] K. Keonwoo, Y. Taek-Young, J. Nam-Su, and C. Ku-Young, “Client-side deduplication to enhance security and reduce communication costs,” ETRI Journal, vol. 39, no. 2, pp. 116-123,2017.
[10] H. Gang, H. Yan, and L. Xu, Secure Image Deduplication in Cloud Storage. Cham: Springer International Publishing, 2015, pp. 243-251.
[11] F. Rashid, A. Miri, and I. Woungang, “Secure image deduplication through image compression,” J. Inf. Secur. Appl., vol. 27, no. C, pp. 54-64, 2016.
[12] D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J. Ma, and J. Ren, “A client-based secure deduplication of multimedia data,” in IEEE International Conference on Communications, Paris, France, 2017, pp. 1-6.
[13] X. Li, J. Li, and F. Huang, “A secure cloud storage system supporting privacy-preserving fuzzy deduplication,” Soft Computing, vol. 20, no. 4, pp. 1437-1448, 2016.
[14] Ashish Agarwala, Priyanka Singh, Pradeep k, “Client side secure image deduplication using DICE protocol,” Albony, New York, USA.