Image De-Duplication by using Tin Eye Match Service Engine in Cloud Computing

S. Simon Thomas*, R. Krishna Prakash**
*-** Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology, Tholurpatti, Tamil Nadu, India.
Periodicity:July - December'2021
DOI : https://doi.org/10.26634/jcc.8.2.16737

Abstract

Cloud computing is well-known for delivering hosted services over the Internet. These services are mainly divided into three, such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Cloud computing uses the computer system resources, especially storage, and computing power, and is available on-demand without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds are predominant today, and data de-duplication is one of the strategies used to solve the repetition of information. This paper proposes preventing the replication of documents and media records like pictures using the TinEye algorithm. The deduplication strategies are commonly used in the cloud server to decrease the server's gap. To save the unauthorized use of statistics and gaining access to and creating reproduction information on the cloud, the encryption approach is to encrypt the facts before being stored on a cloud server. In this proposed system CloudMe is used for cloud storage. All files are encrypted using the AES algorithm and saved in the real cloud. A secure system architecture layout provides secure deduplication. The design permits the cloud with the critical de duplication functionality to completely cast off the bigger storage and bandwidth price. Thus, the proposed system involves image files in opposition to deduplication strategies to eliminate more storage and bandwidth value.

Keywords

TinEye, AES Algorithm, De-duplication.

How to Cite this Article?

Thomas, S. S., and Prakash, R. K. (2021). Image De-Duplication by using Tin Eye Match Service Engine in Cloud Computing. i-manager’s Journal on Cloud Computing, 8(2), 5-9. https://doi.org/10.26634/jcc.8.2.16737

References

[1]. Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2008, September). Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (pp. 1-10). https://doi.org/10.1145/1460877.146 0889
[2]. Buyya, R., Yeo, C. S., & Venugopal, S. (2008, September). Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In 2008, 10th IEEE International Conference on High Performance Computing and Communications (pp. 5- 13). IEEE. https://doi.org/10.1109/HPCC.2008.172
[3]. Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: A critical review. International Journal of Computer Network and Information Security, 6(3), 20-29.
[4]. Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113-3125. https://doi.org/10.1109/ TKDE.2016.2580139
[5]. Hussein, M. K., & Mousa, M. H. (2012). A light-weight data replication for cloud data centers environment. International Journal of Engineering and Innovative Technology, 1(6), 169-175.
[6]. Juels, A., & Kaliski Jr, B. S. (2007, October). PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 584-597). https://doi.org/10.1145/1315245.1315317
[7]. Kharbach, M. (2010). TinEye Reverse Image Search Full Review. Educational Technology and Mobile Learning. Retrieved from https://www.educatorstechnology.com/ 2022/01/tineye-reverse-image-search-full-review.html
[8]. Kondo, D., Javadi, B., Malecot, P., Cappello, F., & Anderson, D. P. (2009, May). Cost-benefit analysis of cloud computing versus desktop grids. In 2009, IEEE International Symposium on Parallel & Distributed Processing (pp. 1-12). IEEE.
[9]. Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W. (2013). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615-1625. https:// doi.org/10.1109/tpds.2013.284
[10]. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards & Technology, (pp.1-7).
[11]. Singh, S. K. R., & Agrahari, S. K. (2012). Ensuring data storage security in cloud computing. IOSR Journal of Engineering, 2(12), 17-21. https://doi.org/10.1109/IWQoS. 2009.5201385.
[12]. Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: towards a cloud definition. ACM Sigcomm Computer Communication Review, 39(1), 50-55. https://doi.org/10.1145/1496091.14 96100
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.