2015
DOI: 10.1007/978-3-319-24315-3_25
|View full text |Cite
|
Sign up to set email alerts
|

Secure Image Deduplication in Cloud Storage

Abstract: Part 8: Multimedia SecurityInternational audienceWith the great development of cloud computing in recent years, the explosive increasing of image data, the mass of information storage, and the application demands for high availability of data, network backup is facing an unprecedented challenge. Image deduplication technology is proposed to reduce the storage space and costs. To protect the confidentiality of the image, the notion of convergent encryption has been proposed. In the deduplication system, the ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Image compression followed by encryption and hashing in sequence reduces the computational overhead, resources, and metadata to be stored. Authors of [12] discuss how cloud services have had an immense improvement in this year in terms of Secure Image Deduplication. Due to this great development in the services, many people have started storing data, which may also be redundant.…”
Section: Secure Image Deduplicationmentioning
confidence: 99%
“…Image compression followed by encryption and hashing in sequence reduces the computational overhead, resources, and metadata to be stored. Authors of [12] discuss how cloud services have had an immense improvement in this year in terms of Secure Image Deduplication. Due to this great development in the services, many people have started storing data, which may also be redundant.…”
Section: Secure Image Deduplicationmentioning
confidence: 99%
“…Note that some practical attacks are not prevented by this ideal functionality, most notably that adversaries are able to learn in a quantifiable way how similar their uploaded images are to those of another user. This is a common problem in secure deduplication schemes, and to the best of our knowledge there is no consensus in the community of how to address this concern [8], [16]. We address some of these attacks with practical safeguards discussed in Section VI.…”
Section: Security Modelmentioning
confidence: 99%
“…When the server notifies two users to share encryption keys, it then also gives them a one-time-use token pair that the users can use to authenticate themselves to one another without revealing their identities. A common assumption in image deduplication is that the server must be able to know which users own which images in order to identify duplicates between different users, so we follow the precedent set by [14], [16], [27], and assume brute-force server inference attacks to be outside our threat model.…”
Section: A Inference and Anonymitymentioning
confidence: 99%