Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing

被引:0
作者
Hu, Lei [1 ,2 ]
机构
[1] Jiangxi Inst Fash Technol, Operat & Maintenance Sect, Assets Dept, Nanchang 330201, Jiangxi, Peoples R China
[2] Jiangxi Inst Fash Technol, Informat Technol Integrat Innovat Ctr, Nanchang 330201, Jiangxi, Peoples R China
关键词
cloud computing; information storage; Internet of Things; sensor technology; ACCESS-CONTROL; MODEL; SECURITY; ISSUES;
D O I
10.1002/spy2.215
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of rapid development of informatization, the Internet of Things (IoT) and cloud computing have also been born and developed, quietly changing our way of life. The application of sensors has also brought great convenience to our lives, but there are still shortcomings that need to be studied in depth. This article aims to study the application and realization of Internet and cloud computing in sensor information storage. Aiming at the problems of sensors with multiple sources of information, large amount of data concurrency and low efficiency, the single-point data agent is clustered and clustered to achieve high availability of sensor information storage. After a series of experimental results analysis, the information storage system constructed in this article can input 12 700 pieces of information per second and output 134 pieces of information per second. Therefore, sensor information storage based on the IoT and cloud computing has higher work efficiency, safety performance and availability than other sensor information storage. The architecture of information storage based on the IoT and sensors made in this article has far-reaching significance for the development of smart devices in the future, and has great research value.
引用
收藏
页数:15
相关论文
共 35 条
  • [1] Security and privacy issues in cloud computing
    Abbas, Haider
    Maennel, Olaf
    Assar, Said
    [J]. ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 233 - 235
  • [2] HOW THE INDUSTRIAL INTERNET OF THINGS CHANGES BUSINESS MODELS IN DIFFERENT MANUFACTURING INDUSTRIES
    Arnold, Christian
    Kiel, Daniel
    Voigt, Kai-Ingo
    [J]. INTERNATIONAL JOURNAL OF INNOVATION MANAGEMENT, 2016, 20 (08)
  • [3] A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications
    Bao, Shu-Di
    Chen, Meng
    Yang, Guang-Zhong
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (06) : 1487 - 1494
  • [4] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [5] Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing
    Chen, Xu
    Jiao, Lei
    Li, Wenzhong
    Fu, Xiaoming
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2827 - 2840
  • [6] Chen YL, 2016, CHINA COMMUN, V13, P146, DOI 10.1109/CC.2016.7405733
  • [7] Dartmann Guido, 2019, BIG DATA ANAL CYBER, P1
  • [8] Fog Computing: Helping the Internet of Things Realize Its Potential
    Dastjerdi, Amir Vahid
    Buyya, Rajkumar
    [J]. COMPUTER, 2016, 49 (08) : 112 - 116
  • [9] Dong XJ, 2017, AGRO FOOD IND HI TEC, V28, P1558
  • [10] A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
    Hameed, Abdul
    Khoshkbarforoushha, Alireza
    Ranjan, Rajiv
    Jayaraman, Prem Prakash
    Kolodziej, Joanna
    Balaji, Pavan
    Zeadally, Sherali
    Malluhi, Qutaibah Marwan
    Tziritas, Nikos
    Vishnu, Abhinav
    Khan, Samee U.
    Zomaya, Albert
    [J]. COMPUTING, 2016, 98 (07) : 751 - 774