Proof of Retrieval and Ownership for Secure Fuzzy Deduplication of Multimedia Data

  • S. Preetha Bini
  • S. Abirami
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)


With explosive growth of digital data and users wanting to outsource the data, there is great need for securely storing the data and utilization of storage space. Data deduplication eliminates redundant data from the storage and, thereby reducing the backup window, improves the efficiency of storage space and utilization of network bandwidth. Multimedia data such as images and videos are a good choice for deduplication, as it is one of the most frequent shared types of data found on data storage. A conventional secure deduplication employs exact data deduplication which is too rigid for multimedia data. Perceptually similar data maintain human visual perception and consume a lot of storage space. The proposed approach provides a framework for secure fuzzy deduplication for multimedia data and further strengthens the security by integrating proof of retrieval and proof of ownership protocols.


Multimedia data deduplication Proof of retrieval Proof of ownership 


  1. 1.
    Xia W, Jiang H, Feng D, Tian L, Douglis F, Shilane P, Yu H, Min F, Yucheng Z, Yukun Z (2016) A Comprehensive Study of the Past, Present, and Future of Data Deduplication. In: Proceedings of the IEEE, 104(9):1681–1710.Google Scholar
  2. 2.
    Xuan L, Jin L, Faliang H. (2016) A Secure Cloud Storage System Supporting Privacy-Preserving Fuzzy Deduplication. Journal of Soft Computing, 20(4):1437–1448.Google Scholar
  3. 3.
    Navajit S, Prabin K B. (2014) Perceptual Hash Function for Scalable Video. International Journal of Information Security, 13(81):81–93.Google Scholar
  4. 4.
    Rashid F, Miri A, Woungang I. (2016) Secure Image Deduplication through Image Compression. Journal of Information Security and Applications, 27(28):54–64.Google Scholar
  5. 5.
    Rashid F, Miri A, Woungang I. (2014) Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression. 6th International Symposium on Cyberspace Safety and Security, pp 835–838.Google Scholar
  6. 6.
    Rashid F, Miri A, Woungang I. (2015) Proof of Storage for Video Deduplication in the Cloud. IEEE International Congress on Big Data, pp 499–505.Google Scholar
  7. 7.
    Chen M, Wang S, Tian L. (2013) A High-Precision Duplicate Image Deduplication Approach. Journal of Computers, 8(11):2768–2775.Google Scholar
  8. 8.
    Katiyar A, Weissman J. (2011) Videdup: an Application-Aware Framework for Video De-duplication. 3rd USENIX Conference on Hot Topics in Storage and File Systems, p 7.Google Scholar
  9. 9.
    Roover C D, Vleeschouwer C D, Lefebvre F, Macq B (2005) Robust Video Hashing based on Radial Projections of Key Frames. IEEE Transaction on Signal Processing, 53(10):4020–4037.Google Scholar
  10. 10.
    Halevi S, Harnik D, Pinkas B, Shulman-Peleg A. (2011) Proofs of Ownership in Remote Storage Systems. 18th ACM Conference Computer Communications Security, pp 491–500.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Information Science and TechnologyCollege of Engineering, Anna UniversityChennaiIndia

Personalised recommendations