Efficient Data Aggregation and Duplicate Removal Using Grid-Based Hashing in Cloud-Assisted Industrial IoT

被引:0
作者
Altowaijri, Saleh M. [1 ]
机构
[1] Northern Border Univ, Fac Comp & Informat Technol, Dept Informat Syst, Rafha 91911, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Industrial Internet of Things; Sensors; Cloud computing; Data aggregation; Encryption; Scalability; Temperature sensors; Sensor phenomena and characterization; Reliability; Real-time systems; Industrial Internet of Things (IIoT); extended Merkle grid; data deduplication; data aggregation; hash grid; cloud computing; DATA DEDUPLICATION;
D O I
10.1109/ACCESS.2024.3471952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) involves the incorporation of sensors, devices, and equipment with internet connectivity and data processing abilities. This connectivity allows sensors to collect and exchange data and communicate with each other. The proliferation of sensors and data-producing devices in the industrial sector has led to high volumes of data, causing data duplication and other issues in storage, processing, and resource consumption. To address data duplication becomes vital to guarantee effective operation and resource optimization. Existing data deduplication techniques in IIoT environments often struggle with efficiency and scalability. Current deduplication approaches may involve frequent and unnecessary hash generation for minor variations in sensor readings, resulting in excessive computational overhead, higher energy consumption, and reduced network lifetime. These limitations highlight the need to propose the Grid Hashing-based Efficient Data Aggregation (GH-EDA) scheme, a comprehensive solution that uses effective data aggregation, preprocessing, and region splitting, and employs an Extended Merkle Grid for efficient deduplication. The scheme begins with the aggregation of sensor data, followed by preprocessing steps to filter out irrelevant or noisy data. Subsequently, the data is partitioned into regions and refined to improve resource utilization, thereby enabling fast duplicate detection while minimizing the number of comparisons. Key features of the proposed scheme include a threshold-based approach to hash generation, guaranteeing that only substantial changes produce new hash values. Extensive simulations are conducted using Network Simulator-3. The performance of the proposed scheme is evaluated using metrics such as space reduction, search time, network lifetime, computation time, average latency, and energy utilization. Comparisons with existing techniques demonstrate the superior performance of the GH-EDA.
引用
收藏
页码:145350 / 145365
页数:16
相关论文
共 35 条
  • [1] Abdalkafor Ahmed Subhi, 2022, AIP Conference Proceedings, V2400, DOI 10.1063/5.0112212
  • [2] Al-najeh A., 2024, Int. Res. J. Adv. Eng. Sci., V9, P2455
  • [3] Industrial Internet of Things: Requirements, Architecture, Challenges, and Future Research Directions
    Alabadi, Montdher
    Habbal, Adib
    Wei, Xian
    [J]. IEEE ACCESS, 2022, 10 : 66374 - 66400
  • [4] Baligodugula Vishnu Vardhan, 2023, Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23). Lecture Notes in Networks and Systems (700), P569, DOI 10.1007/978-3-031-33743-7_46
  • [5] PFDup: Practical Fuzzy Deduplication for Encrypted Multimedia Data *
    Cheng, Shuai
    Tang, Zehui
    Zeng, Shengke
    Cui, Xinchun
    Li, Tao
    [J]. JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 40
  • [6] A deep attention based approach for predictive maintenance applications in IoT scenarios
    De Luca, Roberto
    Ferraro, Antonino
    Galli, Antonio
    Gallo, Mose
    Moscato, Vincenzo
    Sperli, Giancarlo
    [J]. JOURNAL OF MANUFACTURING TECHNOLOGY MANAGEMENT, 2023, 34 (04) : 535 - 556
  • [7] A survey on data aggregation techniques in IoT sensor networks
    Dehkordi, Soroush Abbasian
    Farajzadeh, Kamran
    Rezazadeh, Javad
    Farahbakhsh, Reza
    Sandrasegaran, Kumbesan
    Dehkordi, Masih Abbasian
    [J]. WIRELESS NETWORKS, 2020, 26 (02) : 1243 - 1263
  • [8] Machine learning and IoT - Based predictive maintenance approach for industrial applications
    Elkateb, Sherien
    Metwalli, Ahmed
    Shendy, Abdelrahman
    Abu-Elanien, Ahmed E. B.
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2024, 88 : 298 - 309
  • [9] Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
    Fu, Jun-Song
    Liu, Yun
    Chao, Han-Chieh
    Bhargava, Bharat K.
    Zhang, Zhen-Jiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4519 - 4528
  • [10] Two-party interactive secure deduplication with efficient data ownership management in cloud storage
    Guo, Cheng
    Wang, Litao
    Tang, Xinyu
    Feng, Bin
    Zhang, Guofeng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73