Огляд дедуплікації зображень для хмарного зберігання

Increased growth of real-life communication has motivated the creation, transmission, and digital storage of vast volumes of images and video data on the cloud. The explosive increase in virtual/visual image data on cloud servers requires efficient storage utilization that can be addressed using ima...

Повний опис

Збережено в:
Бібліографічні деталі
Видавець:The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
Дата:2023
Автори: Chaudhari, Shilpa, Aparna, Ramalingappa
Формат: Стаття
Мова:English
Опубліковано: The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" 2023
Теми:
Онлайн доступ:http://journal.iasa.kpi.ua/article/view/273996
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!

Організація

System research and information technologies
Опис
Резюме:Increased growth of real-life communication has motivated the creation, transmission, and digital storage of vast volumes of images and video data on the cloud. The explosive increase in virtual/visual image data on cloud servers requires efficient storage utilization that can be addressed using image deduplication technology. Even though the virtual and visual image properties are different, the existing literature uses a similar approach for deduplication checks, which motivated us to consider both image types for this review. This article aims to provide a detailed survey of state-of-the-art visuals as well as virtual image deduplication techniques in a cloud environment, summarizing and organizing them by developing a five-dimensional taxonomy for analysing the features and performance with several non-overlapping categories in each dimension. These include: 1) location of applying deduplication; 2) image feature extraction; 3) time of application; 4) image data partitioning strategy; 5) involvement of user dataset level. Existing image deduplication techniques are categorized into two main categories based on whether the technique involves security. A comparison of techniques is discussed across a set of functional and performance parameters. The current issues are highlighted with the possible future directions to motivate further research studies on the topic.