Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications

被引:1
作者
Rani, Ridhima [1 ]
Kumar, Neeraj [2 ]
Khurana, Meenu [3 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[2] Thapar Univ, Comp Sci & Engn Dept, Patiala, Punjab, India
[3] Chitkara Univ, Sch Engn & Technol, Baddi, Himachal Prades, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 01期
关键词
Data redundancy; Secure deduplication; Big data; IoT; Blockchain; Secure storage; DATA DEDUPLICATION; SECURE DEDUPLICATION; IMAGE DEDUPLICATION; EFFICIENT; INTERNET; CLOUD; PRIVACY; THINGS; FOG; MANAGEMENT;
D O I
10.1007/s10586-023-04209-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT), an enlarged Internet-based network, is a key element of the next information technology revolution. With the evolution of numerous IoT based smart applications like smart city, healthcare, huge amount of heterogenous data called big data with varying volume, velocity and variety is getting space on various storage systems. Data redundancy is a serious problem that wastes a lot of storage capacity and network bandwidth with less data security in setups that blend cloud integrated IoT data storage. Data deduplication/redundancy elimination strategies can effectively decrease and control this issue by removing duplicate data in cloud-integrated IoT storage systems. Security and privacy of data is another major concern. To maximise the storage effectively and extremely securely, with maintained data integrity, confidentiality, minimal storage cost and increased storage use, data deduplication (DD) over encrypted data is also a key problem in cloud integrated IoT storage and computing environment. With the dynamic nature of big data, the majority of current data deduplication techniques which primarily revolve around the static scenes like the backup and archive systems, are inappropriate to be applicable for real time scenarios in IoT environment. To overcome the aforementioned issues this survey presents an analysis of literature on conventional deduplication techniques. It is highlighting the need of deduplication in IoT oriented big data, its parameters and properties of effectiveness, with taxonomy for secure and conventional deduplication and scope of implementing it with new technologies; Blockchain. Further, it elaborates on issues and challenges along with future scope of deduplication schemes in various application domains.
引用
收藏
页码:1063 / 1087
页数:25
相关论文
共 132 条
[21]   Face Deduplication in Video Surveillance [J].
Chen, Qi ;
Yang, Li ;
Zhang, Dongping ;
Shen, Ye ;
Huang, Shuying .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2018, 32 (03)
[23]  
Chum O., 2008, BMVC, V810, P812, DOI [10.5244/C.22.50, DOI 10.5244/C.22.50]
[24]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[25]   Fog Computing: Helping the Internet of Things Realize Its Potential [J].
Dastjerdi, Amir Vahid ;
Buyya, Rajkumar .
COMPUTER, 2016, 49 (08) :112-116
[26]  
2016, International Journal of Science and Research (IJSR), V5, P206, DOI 10.21275/v5i1.nov152632
[27]  
Di Martino B., 2018, INTERNET EVERYTHING, DOI [10.1007/978-981-10-5861-5, DOI 10.1007/978-981-10-5861-5]
[28]   Learning RoI Transformer for Oriented Object Detection in Aerial Images [J].
Ding, Jian ;
Xue, Nan ;
Long, Yang ;
Xia, Gui-Song ;
Lu, Qikai .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :2844-2853
[29]  
Dong W., 2012, P 2 ACM INT C MULT R
[30]   Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions [J].
Elazhary, Hanan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 128 :105-140